{"title":"考虑防御者防御信息策略下的多轮网络生存能力最大化","authors":"Pei-Yu Chen, I-Ju Shih, F. Lin","doi":"10.1109/Mobilware.2013.27","DOIUrl":null,"url":null,"abstract":"Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the \"gradient method\" and \"game theory\" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies\",\"authors\":\"Pei-Yu Chen, I-Ju Shih, F. Lin\",\"doi\":\"10.1109/Mobilware.2013.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the \\\"gradient method\\\" and \\\"game theory\\\" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.\",\"PeriodicalId\":117163,\"journal\":{\"name\":\"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Mobilware.2013.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Mobilware.2013.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies
Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the "gradient method" and "game theory" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.