Resource allocation strategies under attack-defense dual-role and malicious attacks

Pei-yu Chen, Ying Ju Chen, Frank Yeong Sung Lin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.

Original languageEnglish (US)
Title of host publicationLecture Notes in Electrical Engineering
PublisherSpringer Verlag
Pages689-695
Number of pages7
Volume309 LNEE
ISBN (Print)9783642550379
DOIs
StatePublished - 2014
Externally publishedYes
Event9th FTRA InternationalConference on Future Information Technology, FutureTech 2014 - Zhangjiajie, China
Duration: May 28 2014May 31 2014

Publication series

NameLecture Notes in Electrical Engineering
Volume309 LNEE
ISSN (Print)18761100
ISSN (Electronic)18761119

Other

Other9th FTRA InternationalConference on Future Information Technology, FutureTech 2014
CountryChina
CityZhangjiajie
Period5/28/145/31/14

Fingerprint

Resource allocation
Gradient methods
Game theory
Repair
Mathematical models

Keywords

  • Average DOD
  • Multi-Round
  • Network Attack-Defense Dual-Role
  • Network Survivability
  • Optimization
  • Resource Allocation

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Cite this

Chen, P., Chen, Y. J., & Lin, F. Y. S. (2014). Resource allocation strategies under attack-defense dual-role and malicious attacks. In Lecture Notes in Electrical Engineering (Vol. 309 LNEE, pp. 689-695). (Lecture Notes in Electrical Engineering; Vol. 309 LNEE). Springer Verlag. https://doi.org/10.1007/978-3-642-55038-6_107

Resource allocation strategies under attack-defense dual-role and malicious attacks. / Chen, Pei-yu; Chen, Ying Ju; Lin, Frank Yeong Sung.

Lecture Notes in Electrical Engineering. Vol. 309 LNEE Springer Verlag, 2014. p. 689-695 (Lecture Notes in Electrical Engineering; Vol. 309 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chen, P, Chen, YJ & Lin, FYS 2014, Resource allocation strategies under attack-defense dual-role and malicious attacks. in Lecture Notes in Electrical Engineering. vol. 309 LNEE, Lecture Notes in Electrical Engineering, vol. 309 LNEE, Springer Verlag, pp. 689-695, 9th FTRA InternationalConference on Future Information Technology, FutureTech 2014, Zhangjiajie, China, 5/28/14. https://doi.org/10.1007/978-3-642-55038-6_107
Chen P, Chen YJ, Lin FYS. Resource allocation strategies under attack-defense dual-role and malicious attacks. In Lecture Notes in Electrical Engineering. Vol. 309 LNEE. Springer Verlag. 2014. p. 689-695. (Lecture Notes in Electrical Engineering). https://doi.org/10.1007/978-3-642-55038-6_107
Chen, Pei-yu ; Chen, Ying Ju ; Lin, Frank Yeong Sung. / Resource allocation strategies under attack-defense dual-role and malicious attacks. Lecture Notes in Electrical Engineering. Vol. 309 LNEE Springer Verlag, 2014. pp. 689-695 (Lecture Notes in Electrical Engineering).
@inproceedings{477a5f463cef4dea83ad8715754bd7b6,
title = "Resource allocation strategies under attack-defense dual-role and malicious attacks",
abstract = "How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.",
keywords = "Average DOD, Multi-Round, Network Attack-Defense Dual-Role, Network Survivability, Optimization, Resource Allocation",
author = "Pei-yu Chen and Chen, {Ying Ju} and Lin, {Frank Yeong Sung}",
year = "2014",
doi = "10.1007/978-3-642-55038-6_107",
language = "English (US)",
isbn = "9783642550379",
volume = "309 LNEE",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer Verlag",
pages = "689--695",
booktitle = "Lecture Notes in Electrical Engineering",

}

TY - GEN

T1 - Resource allocation strategies under attack-defense dual-role and malicious attacks

AU - Chen, Pei-yu

AU - Chen, Ying Ju

AU - Lin, Frank Yeong Sung

PY - 2014

Y1 - 2014

N2 - How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.

AB - How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.

KW - Average DOD

KW - Multi-Round

KW - Network Attack-Defense Dual-Role

KW - Network Survivability

KW - Optimization

KW - Resource Allocation

UR - http://www.scopus.com/inward/record.url?scp=84902371212&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84902371212&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-55038-6_107

DO - 10.1007/978-3-642-55038-6_107

M3 - Conference contribution

AN - SCOPUS:84902371212

SN - 9783642550379

VL - 309 LNEE

T3 - Lecture Notes in Electrical Engineering

SP - 689

EP - 695

BT - Lecture Notes in Electrical Engineering

PB - Springer Verlag

ER -