Optimal Survivability Enhancement in Complex Vulnerable systems Gregory Levitin The Israel Electric Corporation Ltd.

Slides:



Advertisements
Similar presentations
18 July 2001 Work In Progress – Not for Publication 2001 ITRS Test Chapter ITRS Test ITWG Mike Rodgers Don Edenfeld.
Advertisements

Chapter 12 Maintainability and Availability introduction Availability analysis of the system requires a knowledge: (1)How the components are functional.
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 60s: Power Engineering 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 60s Power Engineering Department of.
DATA SURVIVABILITY VS. SECURITY IN INFORMATION SYSTEMS Gregory Levitin a,b,n, Kjell Hausken c, Heidi A. Taboada d, David W. Coit Presented by Chia-Ling.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Ensuring Non-Functional Properties. What Is an NFP?  A software system’s non-functional property (NFP) is a constraint on the manner in which the system.
Unintentional vs. intentional impacts No impact strategy Attacker’s strategy maximizing the expected damage.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Properties of the System Elements RELIABILITY (AVAILABILITY) PERFORMANCE COST R R R.
Performance Evaluation of Peer-to-Peer Video Streaming Systems Wilson, W.F. Poon The Chinese University of Hong Kong.
Example of Weighted Voting System Undersea target detection system.
Attack-Resistant Networks Allen G. Taylor Communication networks have four primary objectives: Minimize.
Hierarchy of the Binary Models r=nr=nk=rk=r k-out-of-r-from-n:F r n Consecutive k-out-of-n k n n k-out-of-n:F.
Reliability Analysis of Multi-state Systems with Heterogeneous Multi-state Elements Dmitrij Birjukov National Taras Shevchenko University of Kyiv Faculty.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
1 An SLA-Oriented Capacity Planning Tool for Streaming Media Services Lucy Cherkasova, Wenting Tang, and Sharad Singhal HPLabs,USA.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
Modeling and simulation of systems Simulation optimization and example of its usage in flexible production system control.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
Software Reliability SEG3202 N. El Kadri.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
© RHEINMETALL DEFENCE 2014 Systems Engineering at Rheinmetall Air Defence Dr. Marc Honikel.
Advanced Models for Project Management L. Valadares Tavares J. Silva Coelho IST, Lisbon, 2002.
Papers on Storage Systems 1) Purlieus: Locality-aware Resource Allocation for MapReduce in a Cloud, SC ) Making Cloud Intermediate Data Fault-Tolerant,
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Fuzzy Genetic Algorithm
Ergatonic Ltd. “Optimum Parametrical Control Systems” for viability maintaining of modern industry Presented by Prof. Konstantin Bravy, Ph.D., D.Sc. Ergabit.
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan 2011/3/281.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
A Brief Review of Theory for Information Fusion in Sensor Networks Xiaoling Wang February 19, 2004.
1 A New Method for Composite System Annualized Reliability Indices Based on Genetic Algorithms Nader Samaan, Student,IEEE Dr. C. Singh, Fellow, IEEE Department.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. NFP Design Techniques Software Architecture Lecture 20.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. NFP Design Techniques Software Architecture Lecture 20.
Capacity Enhancement with Relay Station Placement in Wireless Cooperative Networks Bin Lin1, Mehri Mehrjoo, Pin-Han Ho, Liang-Liang Xie and Xuemin (Sherman)
O PTIMAL SERVICE TASK PARTITION AND DISTRIBUTION IN GRID SYSTEM WITH STAR TOPOLOGY G REGORY L EVITIN, Y UAN -S HUN D AI Adviser: Frank, Yeong-Sung Lin.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Multi-state System Element Pr{G  x} Element with total failure Element with five different performance levels g*gj4gj4 g j3 gj2gj2 gj1gj1 g j0 =0 x 1.
Multi-state System (MSS) Basic Concepts MSS is able to perform its task with partial performance “all or nothing” type of failure criterion cannot be.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Grid Defense Against Malicious Cascading Failure Paulo Shakarian, Hansheng Lei Dept. Electrical Engineering and Computer Science, Network Science Center,
Introduction to IT investment decision-making Pertemuan 1-2 Matakuliah: A Strategi Investasi IT Tahun: 2009.
Heterogeneous redundancy optimization for multi-state series-parallel systems subject to common cause failures Chun-yang Li, Xun Chen, Xiao-shan Yi, Jun-youg.
Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010.
Research Direction Introduction
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Optimal Network Protection Against Diverse Interdictor Strategies Jose E. Ramirez-Marquez, Claudio M. Rocco, Gregory Levitin Advisor : Professor Frank.
the project of the voluntary distributed computing ver.4.06 Ilya Kurochkin Institute for information transmission problem Russian academy of.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Pouya Ostovari and Jie Wu Computer & Information Sciences
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
S URVIVABILITY OF SYSTEMS UNDER MULTIPLE FACTOR IMPACT E DWARD K ORCZAK, G REGORY L EVITIN Adviser: Frank,Yeong-Sung Lin Present by Sean Chou 1.
Sensing and Measurements Tom King Oak Ridge National Laboratory April 2016.
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Capacity Regions for Wireless AdHoc Networks
Software Architecture Lecture 20
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷
Uncovered failures in MSS
Optimal defence of single object with imperfect false targets
Presentation transcript:

Optimal Survivability Enhancement in Complex Vulnerable systems Gregory Levitin The Israel Electric Corporation Ltd.

Survivable system - system that is able to “complete its mission in a timely manner, even if significant portions are incapacitated by attack or accident”. Multi-state system with different performance rates Reliability + vulnerability analysis w Pr{w>W*} W* S(W*)

SYSTEM OUTPUT PERFORMANCE DISTRIBUTION G P W2W2W2W … W1W1W1W1 0.85

System survivability enhancement by element separation

Basic Definitions lowest-level part of system, which is characterized by its inherent value, availability and performance distribution collection of elements with the same functionality connected in parallel in reliability logic-diagram sense quantitative measure of task performing intensity of element or system (capacity, productivity, processing speed, task completion time etc.)

Basic Definitions technical or organizational measure aimed at reduction of destruction probability of a group of system elements in the case of attack action aimed at preventing simultaneous destruction of several elements in the case of single attack (can be performed by spatial dispersion, by encapsulating different elements into different protective casings, by using different power sources etc.) group of system elements separated from other elements (and possibly protected) so that a single external impact destroying elements belonging to a certain group cannot destroy elements from other groups object that imitates protected group of system elements, but does not contain any element (the total damage caused by the destruction of any false target is much lower than the damage caused by the destruction of any protection group)

... Optimal element separation problem

PARAMETERS OF SYSTEM ELEMENTS

OPTIMAL SEPARATION SOLUTION FOR v=0.05

System survivability enhancement by element protection

... Survivability optimization problem

Functional scheme of system Desired system performance and survivability W, S* Survivability and cost of possible protections List of available elements with given performance distributions List of chosen elements Separation and protection of elements Optimal system structure

Producing units Protection

S MSS = C MSS =152.2 Optimal structure for W=5, S*=0.85

5 7 s2s s1s1 s3s3 s5s5 s4s4 s6s6 2 1 Multilevel protection

Protection survivability importance in simplest binary systems s1s1 s2s2 s3s3... snsn a s1s1 s2s2 s3s3 snsn a s2s2 s1s1 snsn s3s3 a

Protection survivability importance and relevancy in multi-state system 5 7 s2s s1s1 s3s3 s5s5 s4s4 s6s6

Optimal multilevel protection problem Structure of series-parallel system Performance distribution of system elements List of chosen protections Desired system performance and survivability W, S* Survivability and cost of possible protections c m, s m

Parameters of a system to be optimized No of element (j) g jk p jk g jk p jk g jk p jk g jk p jk g jk p jk g jk p jk State (k) No of element (j) g jk p jk g jk p jk g jk p jk g jk p jk g jk p jk g jk p jk State (k) protection cost protection survivability set of protected elements No of protection … ,8,9,10,11, ,2,3,4,5,6,7,8,9,10,11, 12 29

w=7, S*=0.85 Optimal multilevel protection solutions

Protection against multiple factor impacts Destructive factors Protections Complex protections

A A B Example of two different protection configurations S A >S B S A <S B

Unintentional vs. intentional impacts No impact strategy Attacker’s strategy maximizing the expected damage

Expected damage model Cumulative performance of the group Attack probabilityProtection vulnerability System performance reduction Equipment losses Expected damage Failures p v g

Defense strategy Damage Separation Protection Destruction probability False targets Impact probability Disinformation p g v

Single attack strategy Perfect knowledge about the system No knowledge about the system p=1/N p=1 p Imperfect knowledge about the system pp  p i =1

Multiple attack strategy Unlimited resource p=1 ppp Limited resource + perfect knowledge about the system p=1 Limited resource + imperfect knowledge about the system  p i >1

Tools for solving the problems Evaluating system performance distribution u j (z)u i (z) Universal generating function technique Universal simulated evolution technique Genetic Algorithm Solving optimization problems

References 1. Optimal separation of elements in vulnerable multi-state systems, G. Levitin, A. Lisnianski,Reliability Engineering & System Safety, vol. 73, pp , (2001). 2. Optimizing survivability of vulnerable series-parallel multi-state systems, G. Levitin, A. Lisnianski, Reliability Engineering & System Safety, vol. 79, pp , (2003). 3. Optimal multilevel protection in series-parallel systems, G. Levitin, Reliability Engineering & System Safety, vol. 81, pp , (2003). 4. Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm, G. Levitin, Y. Dai, M. Xie, K. L. Poh, Reliability Engineering & System Safety, vol. 82, pp , (2003). 5. Protection survivability importance in systems with multilevel protection, G. Levitin, Quality and Reliability Engineering International, vol. 20, pp , (2004). 6. Survivability of series-parallel systems with multilevel protection, E. Korczak, G. Levitin, H. Ben Haim, Reliability Engineering & System Safety, vol. 90, pp.45-54, (2005). 7. Incorporating common-cause failures into series-parallel multi-state system analysis, G. Levitin, IEEE Transactions on Reliability, vol. 50, No. 4, pp (2001). 8. Maximizing survivability of vulnerable weighted voting systems, G. Levitin, Reliability Engineering & System Safety, vol. 83, pp.17-26, (2003). 9. Maximizing survivability of acyclic transmission networks with multi-state retransmitters and vulnerable nodes, G. Levitin, Reliability Engineering & System Safety, vol. 77, pp , (2002). 10. Survivability maximization for vulnerable multi-state system with bridge topology, G. Levitin, A. Lisnianski, Reliability Engineering & System Safety, vol. 70, pp , (2000). 11. Universal generating function in reliability analysis and optimization, G. Levitin, Springer-Verlag, Multi-state system reliability. Assessment, optimization and applications, A. Lisnianski, G. Levitin, World Scientific, 2003.

Contents: -Basic Tools and Techniques. -UGF in Reliability Analysis of Binary Systems. -Introduction to Multi-state Systems. -UGF in Analysis of Series-parallel MSS. -UGF in Optimization of Series-parallel MSS. -UGF in Analysis and Optimization of Special Types of MSS. -UGF in Analysis and Optimization of Consecutively Connected Systems and Networks. -UGF in Analysis and Optimization of Fault-tolerant Software.