Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies

Pei-Yu Chen, I-Ju Shih, F. Lin
{"title":"Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies","authors":"Pei-Yu Chen, I-Ju Shih, F. Lin","doi":"10.1109/Mobilware.2013.27","DOIUrl":null,"url":null,"abstract":"Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the \"gradient method\" and \"game theory\" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Mobilware.2013.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the "gradient method" and "game theory" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.
考虑防御者防御信息策略下的多轮网络生存能力最大化
当前,企业面临着诸多网络安全挑战。如何有效地分配防御资源以减少网络攻击者造成的损失,评估系统的生存能力以保证服务的正常运行成为重要的问题。因此,我们开发了一个网络攻击者和网络防御者都不完全了解对方信息的场景。我们建立了一个数学模型来分析这一问题,以帮助决策者解决这些困境。然后利用平均DOD来评估网络的破坏程度,以估计网络攻击者和网络防御者可能采取的所有策略。此外,网络防御者可以发布一些可能什么都不做的信息、真相、秘密或欺骗来迷惑网络攻击者,以达到更好的防御效率。在解决问题的过程中,将运用“梯度法”和“博弈论”来获得网络攻击者和网络防御者的最优资源分配策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信