March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.

Slides:



Advertisements
Similar presentations
Great Theoretical Ideas in Computer Science
Advertisements

NP-Hard Nattee Niparnan.
Great Theoretical Ideas in Computer Science for Some.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
The Theory of NP-Completeness
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Approximation Algorithms Chapter 5: k-center. Overview n Main issue: Parametric pruning –Technique for approximation algorithms n 2-approx. algorithm.
1 Fast Primal-Dual Strategies for MRF Optimization (Fast PD) Robot Perception Lab Taha Hamedani Aug 2014.
Los Angeles September 27, 2006 MOBICOM Localization in Sparse Networks using Sweeps D. K. Goldenberg P. Bihler M. Cao J. Fang B. D. O. Anderson.
Great Theoretical Ideas in Computer Science.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Approximation Algorithms
1 Vertex Cover Problem Given a graph G=(V, E), find V' ⊆ V such that for each edge (u, v) ∈ E at least one of u and v belongs to V’ and |V’| is minimized.
The Theory of NP-Completeness
Aggregation in Sensor Networks NEST Weekly Meeting Sam Madden Rob Szewczyk 10/4/01.
Analysis of Algorithms CS 477/677
Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Kenneth Berman Fred Annexstein Aravind Ranganathan.
Co-opetition in Network Tasks Yoram Bachrach, Peter Key, Jeff Rosenschein, Morteza Zadimoghaddam, Ely Porat.
Chapter 11: Limitations of Algorithmic Power
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
The Shortest Path Problem
1 Lecture 4 Maximal Flow Problems Set Covering Problems.
Introduction to Graph Theory
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
Chapter 11 Limitations of Algorithm Power. Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples:
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
   Yvo Desmedt October 31, 2002 SECURITY PROBLEMS WITH ON-LINE REVOCATION By Yvo Desmedt Dept. Of Computer Science Florida State University
Network Aware Resource Allocation in Distributed Clouds.
All that remains is to connect the edges in the variable-setters to the appropriate clause-checkers in the way that we require. This is done by the convey.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Approximation Algorithms
1 Nasser Alsaedi. The ultimate goal for any computer system design are reliable execution of task and on time delivery of service. To increase system.
Introduction to Algorithms (2 nd edition) by Cormen, Leiserson, Rivest & Stein Chapter 1: The Role of Algorithms in Computing (slides by N. Adlai A. DePano)
CSC 172 P, NP, Etc. “Computer Science is a science of abstraction – creating the right model for thinking about a problem and devising the appropriate.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
1 Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples: b number of comparisons needed to find the.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of.
1 The Theory of NP-Completeness 2 Cook ’ s Theorem (1971) Prof. Cook Toronto U. Receiving Turing Award (1982) Discussing difficult problems: worst case.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
Lecture 6 NP Class. P = ? NP = ? PSPACE They are central problems in computational complexity.
CSE 589 Part V One of the symptoms of an approaching nervous breakdown is the belief that one’s work is terribly important. Bertrand Russell.
1 EL736 Communications Networks II: Design and Algorithms Class7: Location and Topological Design Yong Liu 10/24/2007.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
CPS Computational problems, algorithms, runtime, hardness (a ridiculously brief introduction to theoretical computer science) Vincent Conitzer.
Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central University 1 Chapter 7 Time Complexity Some slides are in courtesy.
Lecture 25 NP Class. P = ? NP = ? PSPACE They are central problems in computational complexity.
NP-completeness NP-complete problems. Homework Vertex Cover Instance. A graph G and an integer k. Question. Is there a vertex cover of cardinality k?
Chapter 11 Introduction to Computational Complexity Copyright © 2011 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.
CSC 413/513: Intro to Algorithms
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
CSC 172 P, NP, Etc.
More NP-Complete and NP-hard Problems
Complexity of Determining Nonemptiness of the Core
Great Theoretical Ideas in Computer Science
Discrete Mathematics for Computer Science
Chapter 11 Limitations of Algorithm Power
Algorithms for Budget-Constrained Survivable Topology Design
CSE 550 Computer Network Design
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK

March 8, 2006  Yvo Desmedt This presentation is based on joint works with: Yongge Wang (University of North Carolina, Charlotte) Mike Burmester (Florida State University)

March 8, 2006  Yvo Desmedt How to approach? Approach: – In our model terrorist can destroy parts of our infrastructure (micro or macro) without specifying how.

March 8, 2006  Yvo Desmedt Using an AI model The economics of the enemy Discussion and extensions

March 8, 2006  Yvo Desmedt Using an AI model Problems with the communication model: network model: too homogeneous: computers do not play similar roles: good only for theoretical results

March 8, 2006  Yvo Desmedt Using an AI model Network graph: reliable communication A B P3P3 P1P1 P2P2 information : can go via P 1 or P 2 or P 3

March 8, 2006  Yvo Desmedt Using an AI model Problems with the communication model: network model: certain distributed computation (e.g. transactions require that all sub- transactions have taken place: well known in mechanical world. Mechanical world uses PERT graph

March 8, 2006  Yvo Desmedt Using an AI model PERT graph (Program Evaluation and Review Technique): Directed acyclic graph for car/truck manufacturing system

March 8, 2006  Yvo Desmedt Using an AI model Truck plant... steel plastics screw

March 8, 2006  Yvo Desmedt Using an AI model Impact goes beyond computers. So we need to have a model that integrates mechanical and computer world.

March 8, 2006  Yvo Desmedt Using an AI model AND/OR graphs as a model for distributed computation – AND/OR graphs: acyclic directed graph: vertices labeled: AND or OR – AND: PERT aspect, i.e. multiple inputs – OR: network aspect redundancy – allow to integrate computer and mechanical aspects

March 8, 2006  Yvo Desmedt Using an AI model Secure distributed computation needs a different model The airplane’s next position P' = P  S  T  1/2 a  T 2 P :current position S :speed a :acceleration, here a = 0

March 8, 2006  Yvo Desmedt Wang-Desmedt-Burmester use an AI concept :  a vertex is: a sensor, or a process, or a dedicated computer AND-vertexOR-vertex +

March 8, 2006  Yvo Desmedt Using an AI model ● Disadvantage of AND/OR graph: – Deciding whether a given graph is k- connected is in P, – however equivalent problem in AND/OR graph is NP-complete.

March 8, 2006  Yvo Desmedt Using an AI model

March 8, 2006  Yvo Desmedt Using an AI model ● Adding impact factor flow: Preliminary question: Given: AND/OR graph G, capacity function positive integer z Question: Is there a flow f (additive) such that the flow at the output is at least z? Is already NP-complete for the case z=1.

March 8, 2006  Yvo Desmedt Using an AI model ● Adding impact factor: flow: critical vertices: – Set U, |U|<k: removed from graph (no input/output vertices) – for all U’, |U’|<k: maximal flow U =< maximal flow U’ Given: AND/OR graph G, capacity function, set U Question: Is U critical? Is NP-hard, and L is not in NP and not in co-NP (if P is different from NP).

March 8, 2006  Yvo Desmedt Using an AI model ● Adding impact factor: flow: below critical flow: Given: AND/OR graph G, capacity function, integers k and p. Question: Does there exists a vertex set U such that: |U| < k maximal flow U < p Is NP-hard, and L is not in NP and not in co-NP (if P is different from NP).

March 8, 2006  Yvo Desmedt The economics of the enemy Introduction: – Seems hard to model since different opponents have different goals: war: undermine economy, military output terrorist: visible targets or targets with large impact hacker: e.g. show that a system is insecure

March 8, 2006  Yvo Desmedt The economics of the enemy Introduction: – Assume the enemy has a budget B E : not necessarily expressed in $. – Optimization of the attack: may be, may be not

March 8, 2006  Yvo Desmedt The economics of the enemy Feasible attacks? – Analysis of the threshold Byzantine model Breaking into: any k machines: feasible any k+1 machines: infeasible First economic model: – uniform (same price to attack any machine), implies that the cost is linear.

March 8, 2006  Yvo Desmedt The economics of the enemy – Problems of the linear aspect: too linear: – cost to break into k computers is not k * cost to break into one, due to: automated attacks availability of attack on WWW same platform,... not homogeneous: – some computers are better protected than others

March 8, 2006  Yvo Desmedt The economics of the enemy – A first alternative: To each subset S of the nodes we assign c S,E as the cost of the enemy E to break into all nodes in S. Still Byzantine iff: – for each subset S of at most k nodes: c S,E =< B E – for each subset S of k+1 nodes or more: c S,E > B E call this the Byzantine cost assumption.

March 8, 2006  Yvo Desmedt The economics of the enemy – A more realistic model: Enemy can attack nodes and links S: a subset of these To each subset corresponds a cost: c S,E Enemy can attack iff c S,E =< B E This defines an adversary structure of the enemy: Gamma.

March 8, 2006  Yvo Desmedt The economics of the enemy – Difficulties: Too many subsets! How to estimate the costs? – Possible solution: cost of attacking m+1 machines using the same operating system (platform) = cost of attacking m machines using the same operating system (platform). – Stability?

March 8, 2006  Yvo Desmedt The economics of the enemy Introduction Feasible attacks? Optimizing the attack The enemy can attack any subset of computers/links in Gamma. Good viewpoint for hacker, not for terrorists and information warfare.

March 8, 2006  Yvo Desmedt The economics of the enemy Optimizing the attack – for an application “a” several computers/links T a are involved. Natural to talk about a flow f T a. – Maximum flow: capacity: C T a – attacking different flow units has a different impact. So we have an impact factor I a.

March 8, 2006  Yvo Desmedt The economics of the enemy Optimizing the attack Total impact of the application: f T a *I a. This gives: – a weighted total flow F (warning not necessarily linear), and – a weighted total capacity C.

March 8, 2006  Yvo Desmedt The economics of the enemy Optimizing the attack BIG QUESTION: which nodes/links are the most optimal for the enemy to take over?

March 8, 2006  Yvo Desmedt The economics of the enemy Optimizing the attack – When enemy takes over a set S in Gamma the weighted total capacity is reduced from C to C S – Enemy will choose S such that: C S is minimal, or C S < C crit (winning strategy)

March 8, 2006  Yvo Desmedt The economics of the enemy – Analysis of the Byzantine case under: Byzantine cost assumption each unit of flow has the same impact when optimized gives: enemy should attack k disjoint paths.

March 8, 2006  Yvo Desmedt The economics of the designer Given (at least): – B D : budget of designer – C D : minimum required weighted total capacity – F T : maximum tolerable impact flow reduction – B E : budget of the enemy – others: maintenance, user friendliness, etc.

March 8, 2006  Yvo Desmedt The economics of the designer Question: design a graph G of computers: – cost(G) =< B D – total impact capacity >= C D – the enemy cannot win If possible: designer won, else the enemy will.

March 8, 2006  Yvo Desmedt The economics of the designer Note: – This is very general! – We need a relation between the cost of setting up computer and the cost to attack, etc.

March 8, 2006  Yvo Desmedt Discussion and extensions Byzantine model had its time Our models can be improved by including: control theory aspects, such as: – time parameters, e.g.: between attack and detection of attack time to recover from an attack time of no return

March 8, 2006  Yvo Desmedt Discussion and extensions – time survivability condition: (time to repair the system) + (time to detect an attack) < (the time of no return) + (the time the stock will last)

March 8, 2006  Yvo Desmedt Discussion and extensions Impact Byzantine model implies expensive redundant hardware. However, if the cost to attack a node is prohibitive: no redundancy is needed.