@inproceedings{477a5f463cef4dea83ad8715754bd7b6,
title = "Resource allocation strategies under attack-defense dual-role and malicious attacks",
abstract = "How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.",
keywords = "Average DOD, Multi-Round, Network Attack-Defense Dual-Role, Network Survivability, Optimization, Resource Allocation",
author = "Chen, {Pei Yu} and Chen, {Ying Ju} and Lin, {Frank Yeong Sung}",
year = "2014",
doi = "10.1007/978-3-642-55038-6_107",
language = "English (US)",
isbn = "9783642550379",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer Verlag",
pages = "689--695",
booktitle = "Future Information Technology",
note = "9th FTRA InternationalConference on Future Information Technology, FutureTech 2014 ; Conference date: 28-05-2014 Through 31-05-2014",
}