Considering Multi-objective Resource Allocation Strategies under Attack-Defense Roles and Collaborative Attacks 考慮攻防雙角色與協同攻擊情況下之多目標資源分配策略 Advisor: Frank,Yeong-Sung.

Slides:



Advertisements
Similar presentations
‧指導教授:林永松 博士 【 Master Thesis 】 Oral Examination A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and.
Advertisements

Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/10/25 1 Research Direction Introduction.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
W.D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Mesh-restorable Network Design (2) E E Module 13.
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Conference title 1 A Few Bad Apples Are Enough. An Agent-Based Peer Review Game. Juan Bautista Cabotà, Francisco Grimaldo (U. València) Lorena Cadavid.
Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
Copyright © Wayne D. Grover 2000 EE 681 Fall 2000 Lecture 15 Mesh-restorable Network Design (2) W. D. Grover, October 26, 2000 copyright © Wayne D. Grover.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
A Learning-Based Approach to Reactive Security * Ben Rubinstein Microsoft Research Silicon Valley With: Adam Barth 1, Mukund Sundararajan 2, John Mitchell.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Team #2 Mingang Fu Lin Ben Kuowei Chen. Traditional Manufacturing Processes Product Layout Functional Layout GMLD Lathe department Milling department.
SYSTEM RELIABILITY OPTIMIZATION CONSIDERING UNCERTAINTY: MINIMIZATION OF THE COEFFICIENT OF VARIATION FOR SERIES- PARALLEL SYSTEMS Hatice Tekiner-Mogulkoc,
Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
Decapitation of networks with and without weights and direction : The economics of iterated attack and defense Advisor : Professor Frank Y. S. Lin Presented.
Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1.
DDoS Attack and Defense 郭承賓 (Allen C.B. Kuo). Autonomous System Entry node.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Simultaneous routing and resource allocation via dual decomposition AUTHOR: Lin Xiao, Student Member, IEEE, Mikael Johansson, Member, IEEE, and Stephen.
Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers Advisor: Professor.
Author: Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Defender Message Strategies to Maximize Network Survivability for Multi-Stage Defense Resource.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
E FFECTIVE N ETWORK P LANNING AND D EFENDING S TRATEGIES TO M INIMIZE S ERVICE C OMPROMISED P ROBABILITY UNDER M ALICIOUS C OLLABORATIVE A TTACKS Advisor:
論文進度報告 Advisor: Professor Frank Y.S. Lin Presented by G.W. Chen 陳冠瑋.
Research Direction Introduction
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1.  1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource.
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
Optimal Defense Against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach Presenter: Wayne Hsiao Advisor: Frank, Yeong-Sung.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
Satisfaction Games in Graphical Multi-resource Allocation
Contents of the Talk Preliminary Materials Motivation and Contribution
Risk and Return: Past and Prologue
The Beta Reputation System
Research Progress Report
Risk and Return: Past and Prologue
Network Optimization Research Laboratory
From Survivability To Risk Management
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Advisor: Professor Yeong-Sung Lin Student: Yeong-Cheng Tzeng (曾勇誠)
國立台灣大學資訊管理研究所 碩士論文口試審查
Adviser: Frank,Yeong-Sung Lin Present by Ying-Ju Chen
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
Advisor: Frank,Yeong-Sung Lin
ADVISOR : Professor Yeong-Sung Lin STUDENT : Hung-Shi Wang
Research Progress Report
Spectrum Sharing in Cognitive Radio Networks
Advisor: Frank Yeong-Sung Lin, Ph.D. Presented by Yu-Jen Hsieh 謝友仁
Presented by Yu-Shun Wang
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷
Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan
Optimal defence of single object with imperfect false targets
Blockchain Mining Games
Presentation transcript:

Considering Multi-objective Resource Allocation Strategies under Attack-Defense Roles and Collaborative Attacks 考慮攻防雙角色與協同攻擊情況下之多目標資源分配策略 Advisor: Frank,Yeong-Sung Lin Present by Ying-Ju Chen Presentation date: Dec. 20, 2011

Agenda Problem Description Mathematical Formulation 12/3/2018

Agenda Problem Description Mathematical Formulation 12/3/2018

Problem Description Two players Two roles Defender Attacker (Collaborative attack) Player 1 Player 2 12/3/2018

Two Roles – Attacker & Defender ‧Normal Attack ‧Retaliation Attack Defender Passive Defense ‧Proactive ‧Reactive Active Defense ‧Preventive Strike 12/3/2018

Role - Defender Defense Proactive Reactive Preventive Strike (PS) Uniformly distribute his defense resources to each node. Reactive Allocate reinforced resources to compromised node which has been repaired. Preventive Strike (PS) According to the flow of the attacker, i.e. the greater flow of the node would be allocated more resources. Cause damage to the counterpart’s network and indirectly influence his retaliation ability. 12/3/2018

Role - Defender Reallocation Repair The resources could be reallocated but the discount factor is also considered. Repair The compromised nodes could be repaired. The reward would be retrieved back from another player. 12/3/2018

Role - Defender Update information (Unknown vulnerabilities) Initially, the defender doesn’t know his system vulnerabilities. The nodes successfully compromised last round imply that these nodes have vulnerabilities. The defender can update his information about the unknown vulnerabilities on his nodes after the attacker’s attack. Once the node be repaired, it will be reinforced more defense resources in this round. (Reactive defense) 12/3/2018

Role - Attacker Attack Normal attack Retaliation attack Based on his local view about the vulnerabilities. Retaliation attack Once the node was preventively struck, he must revenge next round. Since the network would be harmed after being preventively struck, the discount factor is considered. 12/3/2018

Role - Attacker Reward Each node in players’ topologies has a reward. Once being successfully compromised, the reward would be gained by the attacker. Once being repaired next round, the reward would be retrieved by the defender. 12/3/2018

Role - Attacker Update information (Unknown vulnerabilities & Defender’s private information) Each attacker has partial information of the defender’s system, which is called a local view. Each attacker’s local view can grow after exploring in the beginning of each round. The explore cost of each attacker is different and is considered. Through the game, each attacker learns more about the defender’s vulnerabilities information and his private information. 12/3/2018

Update information (Both roles) Defender’s information Vulnerabilities All information about the defender’s topology Defender’s private information Attacker ’s knowledge (combined local view) Attacker 1 Attacker 1’s local view Collaborative attack Attacker 2 Attacker 2’s local view … … Attacker N Attacker N’s local view 12/3/2018

Role - Attacker Collaborative attack There’s always a leader in the collaborative attack in every round. Different leaders have different leaderships. Each attacker’s attack power over a node is different. Each attacker’s cooperative effect is different. The synergy of collaborative attack would be influenced by the cooperative effect of each attacker and the leadership of the leader in that round. In each round, each collaborative attacker’s attack power involved and the collaborative synergy will be reflected in contest success function. Collaborative synergy in round r = (∑ cooperative effect of each attacker ) x (The leader’s leadership) 12/3/2018

Problem Description The network survivability is measured by ADOD. The game has two players. Given Both players have incomplete information of each other. Player 1’s total budget. Player 2’s total budget. 12/3/2018

Problem Description – Players Objective Minimize the damage degree of their own networks (ADOD). Maximize the damage degree of the other player’s network (ADOD). Budget constraint deploying the defense budget on nodes of it’s topology repairing the compromised nodes reinforcing defense budget to compromised node which has been retrieved and repaired deploying the attack budget on nodes of the defender’ topology updating information 12/3/2018

Agenda Problem Description Mathematical Formulation 12/3/2018

Agenda Problem Description Mathematical Formulation 12/3/2018

Given Parameters Notation Description V Index set of nodes of both players’ topologies VA Index set of nodes of player 1’s topology VB Index set of nodes of player 2’s topology R Index set of rounds in the attack and defense actions VAr Index set of nodes of player 2’s combined local view on player 1’s topology in round r, where r ∈ R and VAr ⊆ VA VBr Index set of nodes of player 1’s combined local view on player 2’s topology in round r, where r ∈ R and VBr ⊆ VB EAr Index set of new explored nodes of player 2’s topology in round r, where r ∈ R and EAr ⊆ VA-VA-1 EBr Index set of new explored nodes of player 1’s topology in round r, where r ∈ R and EBr ⊆ VB-VB-1 KA Index set of collaborative attackers of player 1 KB Index set of collaborative attackers of player 2 12/3/2018

Given Parameters Notation Description gAr Player 1’s group of collaborative attackers in round r-1, where gAr ∈ KA and r ∈ R gBr Player 2’s group of collaborative attackers in round r-1, where gBr ∈ KB and r ∈ R wr The weight of the average DOD in round r, where r ∈ R Total budget of player 1 Total budget of player 2 tki Attacker k’s attack power (resources) when attacking on node i, where k ∈ and i ∈ Ck The cooperative effect of attacker k with other collaborative attackers, where k ∈ Lk The leadership of attacker k, which could be positive or negative, where k ∈

Given Parameters Notation Description The synergy of collaborative attack is as a function of the leader’s leadership and individual collaborative attacker’s cooperative effect, which could be positive or negative, when group of collaborative attackers gAr attack on node i in round r-1, where i ∈ VBr, and r ∈ R The synergy of collaborative attack is as a function of the leader’s leadership and individual collaborative attacker’s cooperative effect, which could be positive or negative, when group of collaborative attackers gBr attack on node i in round r-1, where i ∈ VAr, and r ∈ R θi Existing defense resource allocated on node i, where i ∈ V eri Repair cost of players when node i is dysfunctional in round r-1, where i ∈ V and r ∈ R dri The discount rate of the resources that players reallocate on node i in round r, where i ∈ V and r ∈ R fri The reinforcement rate above 1 represents the players reallocate more resources on the retrieved and repaired node i in round r, where i ∈ V and r ∈ R 12/3/2018

Given Parameters Notation Description lkri Explore cost of attacker k when information of node i is updated in round r, where k ∈ , i ∈ , and r ∈ R. The cost is greatly increasing if the node is not adjacent with combined local view. hkri The discount rate of the attack resources that attacker k allocates on node i in round r, which is gained from exploring, where k ∈ , i ∈ V, and r ∈ R ui The reward of compromising node i, where i ∈ V δri 1 if node i is compromised in round r-1, 0 otherwise, where i ∈ and r ∈ R ρri 1 if the attacker takes retaliation attack on node i in round r after the PS of the defender in round r-1, 0 otherwise, where i ∈ and r ∈ R σri The discount rate of the attack resources in round r after the PS of another player in round r-1, where k ∈ , i ∈ , and r ∈ R α Player 1’s weight of ADOD β Player 2’s weight of ADOD 12/3/2018

Decision variables Notation Description yri Proactive defense budget allocation on node i in round r, where i ∈ V and r ∈ R zri PS defense budget allocation on node i in round r, where i ∈ and r ∈ R sri 1 if node i is retrieved and repaired by another player in round r, 0 otherwise, where i ∈ and r ∈ R Ar Total budget of player 1 in round r, where r ∈ R Br Total budget of player 2 in round r, where r ∈ R Player 1’s budget allocation, which is a vector of cost A1, A2 to Ar in round r, where i ∈ V and r ∈ R Player 2’s budget allocation, which is a vector of cost B1, B2, to Br in round r, where i ∈ V and r ∈ R Player 1’s Average DOD, which is considering under player 1’s and player 2’s budget allocation on player 1’s topology in round r, where r ∈ R Player 2’s Average DOD, which is considering under player 1’s and player 2’s budget allocation on player 2’s topology in round r, where r ∈ R 12/3/2018

Objective function (IP 1) (IP 1’) 12/3/2018

Subject to Player 1 Player 2 (IP 1.1) (IP 1.2) 12/3/2018

Subject to (IP 1.3) (IP 1.4) (IP 1.5) (IP 1.6) 12/3/2018

Thanks so much for your listening.  12/3/2018