Advisor: Frank,Yeong-Sung Lin 碩一 冠廷

Slides:



Advertisements
Similar presentations
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung.
Advertisements

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Optimal Analyses for 3  n AB Games in the Worst Case Li-Te Huang and Shun-Shii Lin Dept. of Computer Science & Information Engineering, National Taiwan.
DATA SURVIVABILITY VS. SECURITY IN INFORMATION SYSTEMS Gregory Levitin a,b,n, Kjell Hausken c, Heidi A. Taboada d, David W. Coit Presented by Chia-Ling.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/10/25 1 Research Direction Introduction.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Detection of Nuclear Threats: Defending Multiple Ports Jeffrey Victor Truman 17 July 2009.
Unintentional vs. intentional impacts No impact strategy Attacker’s strategy maximizing the expected damage.
1 Optimizing Utility in Cloud Computing through Autonomic Workload Execution Reporter : Lin Kelly Date : 2010/11/24.
Optimal Survivability Enhancement in Complex Vulnerable systems Gregory Levitin The Israel Electric Corporation Ltd.
Reliability-Redundancy Allocation for Multi-State Series-Parallel Systems Zhigang Tian, Ming J. Zuo, and Hongzhong Huang IEEE Transactions on Reliability,
Game theoretic models for detecting network intrusions OPLab 1.
Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
A N OPTIMAL RELIABILITY ALLOCATION METHOD FOR DIGITAL SUBSTATION SYSTEMS Y UZHOU H U, P EICHAO Z HANG, Y ONGCHUN S U, Y U Z OU Adviser: Frank, Yeong-Sung.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan 2011/3/281.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
MSE-415: B. Hawrylo Chapter 13 – Robust Design What is robust design/process/product?: A robust product (process) is one that performs as intended even.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
WEIS Economic Analysis of Incentives to Disclose Software Vulnerabilities Dmitri Nizovtsev Washburn University Marie Thursby Georgia Institute of.
Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1.
Pasternack1 Optimal Pricing and Return Policies for Perishable Commodities B. A. Pasternack Presenter: Gökhan METAN.
O PTIMAL SERVICE TASK PARTITION AND DISTRIBUTION IN GRID SYSTEM WITH STAR TOPOLOGY G REGORY L EVITIN, Y UAN -S HUN D AI Adviser: Frank, Yeong-Sung Lin.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Defender Message Strategies to Maximize Network Survivability for Multi-Stage Defense Resource.
Minimizing Delay in Shared Pipelines Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) Yoram Revah, Aviran Kadosh.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Paging Area Optimization Based on Interval Estimation in Wireless Personal Communication Networks By Z. Lei, C. U. Saraydar and N. B. Mandayam.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih Defending against multiple different attackers Kjell Hausken, Vicki M. Bier 2011/3/14 1.
Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010.
Research Direction Introduction
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1.  1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource.
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Optimal Defense Against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach Presenter: Wayne Hsiao Advisor: Frank, Yeong-Sung.
Optimal Network Protection Against Diverse Interdictor Strategies Jose E. Ramirez-Marquez, Claudio M. Rocco, Gregory Levitin Advisor : Professor Frank.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
S URVIVABILITY OF SYSTEMS UNDER MULTIPLE FACTOR IMPACT E DWARD K ORCZAK, G REGORY L EVITIN Adviser: Frank,Yeong-Sung Lin Present by Sean Chou 1.
Ensemble Classifiers.
Machine Learning: Ensemble Methods
How Much and On What? Defending and Deterring Strategic Attackers
APRIA 2014 Annual Conference
Sequences, Series, and Probability
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Security Engineering.
Reconstructing Ancient Literary Texts from Noisy Manuscripts
Title of the presentation
Random Testing.
A Non-Parametric Bayesian Method for Inferring Hidden Causes
Symmetric Allocations for Distributed Storage
Defense and attack of complex and dependent systems
Critical infrastructure protection under imperfect attacker perception
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Considering Multi-objective Resource Allocation Strategies under Attack-Defense Roles and Collaborative Attacks 考慮攻防雙角色與協同攻擊情況下之多目標資源分配策略 Advisor: Frank,Yeong-Sung.
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
Steps in Using the and R Chart
Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan
Cryptography Lecture 12.
Optimal defence of single object with imperfect false targets
Discriminative Training
Presentation transcript:

Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 Influence of attacker’s target recognition ability on defense strategy in homogeneous parallel systems Gregory Levitin , Kjell Hausken 2010 Advisor: Frank,Yeong-Sung Lin 碩一 冠廷

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

Introduction Defender distributes its resource: 1. deploying redundant elements 2. protection a subset of the deployed system elements Attacker distributes its resource: 1. detect the unprotected elements (destroyed with negligible effort) 2. (a) evenly among all of the undetected elements (b) among elements from a chosen subset of undetected elements.

Introduction This paper studies the influence of the unprotected element detection probability on the defender’s resource distribution between providing redundancy and protecting the elements in homogeneous parallel systems.

Nomenclature

Illustration (a) evenly among all of the undetected elements (b) among elements from a chosen subset of undetected elements.

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

The efforts distribution and the vulnerability of a single element The vulnerability of any element using the attacker– defender contest success function: x<=r/└F/g┘ (Ng>=F & r>=Nx )

The efforts distribution and the vulnerability of a single element The defender’s objective is to minimize the expected damage using the fixed resource r for deploying system elements and protecting them. The attacker’s objective is to maximize the expected damage using the fixed resource R for attacking the elements.

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

Illustration (a) evenly among all of the undetected elements

The defender protects a subset of the elements, the attacker attacks all elements To decrease the expected damage it may be optimal for the defender to protect M<=N elements. The defender’s effort per element increases to t=(r-Nx)/(Ma). The attacker: 1. Tries to detect the unprotected elements and destroys all the detected unprotected elements with negligible effort.

The defender protects a subset of the elements, the attacker attacks all elements 2. distributes its effort evenly among the remaining elements (protected ones and undetected unprotected ones) (N-h) Let q be the probability that an unprotected element is detected correctly.

The defender protects a subset of the elements, the attacker attacks all elements The probability that the attacker detects correctly h out of N-M unprotected elements is: Each one of the M protected elements is destroyed with probability :

The defender protects a subset of the elements, the attacker attacks all elements The probability that k out of M protected elements are destroyed is The probability that exactly N-M+k elements are destroyed by the attack is

The defender protects a subset of the elements, the attacker attacks all elements The expected damage caused by the attack The defender chooses its two free choice variables N and M minimize the expected damage D. The attacker maximizes D. 若g(M-k) > F 表系統能順利運作,故產生的Damage=0; 若g(M-k) < F 表系統無法順利運作,故F-g(M-k)表damage 大小

The defender protects a subset of the elements, the attacker attacks all elements The optimal values M* and N* of M and N can be obtained

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

Illustration

The attacker attacks a subset of the undetected elements The probability Hs that exactly s elements are destroyed by the attack on Q elements randomly chosen from the set of undetected elements comprising M protected and N-h-M unprotected elements can be obtained as s=Q-f+k => k=s+f-Q (其中Q-f 為未被保護的元素)

The attacker attacks a subset of the undetected elements Damage caused by the attack Assume that for any h the attacker can choose the value of Q=Q*(h) that maximizes the expected damage 若g(N-h-s) > F 表系統能順利運作,故產生的Damage=0; 若g(N-h-s) < F 表系統無法順利運作,故F-g(M-k)表damage 大小

The attacker attacks a subset of the undetected elements

The attacker attacks a subset of the undetected elements The defender chooses N and M to minimize the expected damage D Assume:the attacker chooses for any h the optimal value of Q that maximizes the expected damage d(h,Q).

The attacker attacks a subset of the undetected elements

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

Analysis of the models The first analysis: 1. x=0.3 2. Ɛ=1 3. R=1 5. g=2 6. F=6 7. The attacker attacks all the elements. => N>=3 M*, N*,D as functions of q and m

Analysis of the models

Analysis of the models The second analysis: 1. x=0.6 2. Ɛ=1 3. R=1 5. g=2 6. F=6 7. The attacker attacks all the elements. => N>=3 M*, N*,D as functions of q and m.

Analysis of the models

Analysis of the models The third analysis: 1. x=0.9 2. Ɛ=1 3. R=1 5. g=2 6. F=6 7. The attacker attacks all the elements. => N>=3 M*, N*,D as functions of q and m.

Analysis of the models

Analysis of the models The fourth analysis: 1. x=0.3 2. Ɛ=1 3. R=1 5. g=2 6. F=6 7. The attacker attacks optimal number of elements. => N>=3 M*, N*,D,Q*(0) as functions of q and m.

Analysis of the models

Analysis of the models The fifth analysis: 1. x=0.6 2. Ɛ=1 3. R=1 5. g=2 6. F=6 7. The attacker attacks optimal number of elements. => N>=3 M*, N*,D,Q*(0) as functions of q and m.

Analysis of the models

Agenda Introduction The efforts distribution and the vulnerability of a single element The defender protects a subset of the elements, the attacker attacks all elements The defender protects a subset of the elements, the attacker attacks a subset of the undetected elements Analysis of the models Conclusions

Conclusions This paper considers optimal defense resource distribution between two main actions: 1. deployment of separated redundant system elements 2. protection

Conclusions Attacker distributes its resource: 1. detect the unprotected elements (destroyed with negligible effort) 2. (a) evenly among all of the undetected elements (b) among elements from a chosen subset of undetected elements.

Conclusions With low q the defender may deploy many elements without necessarily protecting all of them. The higher probability of correct detection for the attacker makes it more important for the defender to protect more elements.

Conclusions The expected damage is insensitive to q when the number of protected elements equals the number of deployed elements. Free choice of the number of attacked elements makes the defense strategy more sensitive to q. The decrease of the contest intensity makes the defense strategy insensitive to q because in this case the defender protects all the elements.

Thanks for your listening.