Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers Advisor: Professor.

Slides:



Advertisements
Similar presentations
‧指導教授:林永松 博士 【 Master Thesis 】 Oral Examination A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and.
Advertisements

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Routing algorithms, all distinct routes, ksp, max-flow, and network flow LPs W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 E.
Linear Programming Applications
Minimum-Cost Multicast Routing for Multi- Layered Multimedia Distribution IM PhD Forum, NTU Minimum-Cost Multicast Routing for Multi- Layered Multimedia.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
SYSTEM RELIABILITY OPTIMIZATION CONSIDERING UNCERTAINTY: MINIMIZATION OF THE COEFFICIENT OF VARIATION FOR SERIES- PARALLEL SYSTEMS Hatice Tekiner-Mogulkoc,
Optimal resource assignment to maximize multistate network reliability for a computer network Yi-Kuei Lin, Cheng-Ta Yeh Advisor : Professor Frank Y. S.
Network Optimization Problems
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
Energy-Efficient Sensor Network Design Subject to Complete Coverage and Discrimination Constraints Frank Y. S. Lin, P. L. Chiu IM, NTU SECON 2005 Presenter:
DDoS Attack and Defense 郭承賓 (Allen C.B. Kuo). Autonomous System Entry node.
Simultaneous routing and resource allocation via dual decomposition AUTHOR: Lin Xiao, Student Member, IEEE, Mikael Johansson, Member, IEEE, and Stephen.
Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang.
Column Generation By Soumitra Pal Under the guidance of Prof. A. G. Ranade.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Author: Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Maximization of System Lifetime for Data-Centric Wireless Sensor Networks 指導教授:林永松 博士 具資料集縮能力無線感測網路 系統生命週期之最大化 研究生:郭文政 國立臺灣大學資訊管理學研究所碩士論文審查 民國 95 年 7 月.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Defender Message Strategies to Maximize Network Survivability for Multi-Stage Defense Resource.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
Problem Reduction So far we have considered search strategies for OR graph. In OR graph, several arcs indicate a variety of ways in which the original.
OR Chapter 8. General LP Problems Converting other forms to general LP problem : min c’x  - max (-c)’x   = by adding a nonnegative slack variable.
1 EL736 Communications Networks II: Design and Algorithms Class7: Location and Topological Design Yong Liu 10/24/2007.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
1/74 Lagrangian Relaxation and Network Optimization Cheng-Ta Lee Department of Information Management National Taiwan University September 29, 2005.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
E FFECTIVE N ETWORK P LANNING AND D EFENDING S TRATEGIES TO M INIMIZE S ERVICE C OMPROMISED P ROBABILITY UNDER M ALICIOUS C OLLABORATIVE A TTACKS Advisor:
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
論文進度報告 Advisor: Professor Frank Y.S. Lin Presented by G.W. Chen 陳冠瑋.
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
Research Direction Introduction
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1.  1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource.
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
Approximation Algorithms based on linear programming.
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
6.5 Stochastic Prog. and Benders’ decomposition
Frank Yeong-Sung Lin (林永松) Information Management Department
國立臺灣大學資訊管理學研究所碩士論文審查
Dr. Arslan Ornek IMPROVING SEARCH
1.3 Modeling with exponentially many constr.
Optimization of Wireless Station Time Slot Allocation with Consideration of Throughput and Delay Constraints 指導教授:林永松 博士 研究生:林岦毅.
Presented by Hermes Y.H. Liu
Network Optimization Research Laboratory
From Survivability To Risk Management
Considering Multi-objective Resource Allocation Strategies under Attack-Defense Roles and Collaborative Attacks 考慮攻防雙角色與協同攻擊情況下之多目標資源分配策略 Advisor: Frank,Yeong-Sung.
Advisor: Professor Yeong-Sung Lin Student: Yeong-Cheng Tzeng (曾勇誠)
國立台灣大學資訊管理研究所 碩士論文口試審查
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
ADVISOR : Professor Yeong-Sung Lin STUDENT : Hung-Shi Wang
1.3 Modeling with exponentially many constr.
Advisor: Frank Yeong-Sung Lin, Ph.D. Presented by Yu-Jen Hsieh 謝友仁
Presented by Yu-Shun Wang
Frank Yeong-Sung Lin (林永松) Information Management Department
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Advisor: Professor Frank Y.S. Lin Ray J.P. Lo 駱睿斌
Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan
6.5 Stochastic Prog. and Benders’ decomposition
Graphical solution A Graphical Solution Procedure (LPs with 2 decision variables can be solved/viewed this way.) 1. Plot each constraint as an equation.
Chrysostomos Koutsimanis and G´abor Fodor
Presentation transcript:

Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers Advisor: Professor Frank Y.S. Lin Ray J.P. Lo 駱睿斌 考量自然災害與智慧型攻擊下 確保服務持續性之冗餘及防禦資源配置演算法

2015/12/7NTU IM OPLab2 Agenda  Introduction  Problem Formulation  Lagrangean Relaxation Decomposition Heuristics for Getting Primal Feasible Solutions  Problems

2015/12/7NTU IM OPLab3 Agenda  Introduction  Problem Formulation  Lagrangean Relaxation Decomposition Heuristics for Getting Primal Feasible Solutions  Problems

2015/12/7NTU IM OPLab4 Background  Business Continuity Management (BCM) Disaster Recovery Planning (DRP)  Redundancy Allocation Problem (RAP)

2015/12/7NTU IM OPLab5 Scenario  Considering a network consisted of AS-level nodes: Just one kind of specified function is provided by each node.  The plan about which node providing what kind of function is predefined and consistent. Multiple core nodes

2015/12/7NTU IM OPLab6 Defender  The defender hopes to enhance the survivability of whole network by exploiting unified purchase to implement redundancy allocation. There is a product list that is known by both the defender and the attacker.

2015/12/7NTU IM OPLab7 Defender (cont ’ d) Redundant Component Choice Sets of Different Functions Defense Mechanism Choice Sets of Different Redundant Components

2015/12/7NTU IM OPLab8 Attacker  The attacker also has the perfect knowledge about this target network. The topology of the network The allocation of redundant components and defense mechanisms in each node  Extreme experience accumulation  The attacker ’ s final goal is minimizing the total attack cost of compromising all core nodes by choosing proper nodes to compromise.

2015/12/7NTU IM OPLab9 Scenario S C C S C C

2015/12/7NTU IM OPLab10 S Scenario S CSCS CSCS S CSCS C prefer S C C

2015/12/7NTU IM OPLab11 Agenda  Introduction  Problem Formulation  Lagrangean Relaxation Decomposition Heuristics for Getting Primal Feasible Solutions  Problems

2015/12/7NTU IM OPLab12 Assumption  Every node in this network is at AS-level.  No attack on links is considered.  Both the defender and the attacker have perfect knowledge about this network.  Each node in the network must provide just one kind of predefined function.  The defender has limitation of total defense budget.  The requirement of service availability threshold, which defines the minimum expected number of redundant components for every node, must be satisfied.

2015/12/7NTU IM OPLab13 Assumption (cont ’ d)  All kinds of redundant components in a choice set provide identical main function.  Other than providing the main function, all kinds of redundant components also have little basic defensive ability.  All redundant components are in hot- standby state.  All compromised redundant components are never repaired.

2015/12/7NTU IM OPLab14 Assumption (cont ’ d)  There are several extra defense mechanisms available for further protecting each kind of redundant component.  The defender must decide which extra defense mechanisms to deploy for protecting a redundant component when allocating a redundant component in a node.

2015/12/7NTU IM OPLab15 Assumption (cont ’ d)  A node is subject to attack only if a path exists from node s to that node, and all the intermediate nodes on the path have been compromised.  The attacker will compromise just one redundant component, the primary one, in non-core nodes for penetrating, and compromise all redundant components in core nodes for whole dysfunction. A non-core node is compromised if one of redundant components allocated in it has been compromised. A core node is compromised if and only if all redundant components allocated in it have been compromised.

2015/12/7NTU IM OPLab16 Assumption (cont ’ d)  While attempting to compromise a non-core node, the attacker can always arbitrarily choose the redundant component with most advantage for minimizing total attack cost to compromise.  A redundant component is subject to attack only if all extra defense mechanisms allocated to protect it have been compromised.  The probability that a redundant component operates properly is independent of whether extra defense mechanisms are deployed to it.

2015/12/7NTU IM OPLab17 Assumption (cont ’ d)  If the attacker has compromised the extra defense mechanism d of redundant component m once, he/she then learned some effective skills or developed some powerful hacker tools to deal with this kind of defensive mechanism d of redundant component m. Hence, the attacker can compromise the same kind of defensive mechanism d of the same kind of redundant component m without spending any cost afterward. According to the same reason mentioned above, the attacker can compromise any kind of redundant component which he/she has ever compromised without spending any cost.

2015/12/7NTU IM OPLab18 Given  The Core nodes  The initial position of attacker  The topology and size of the network  The total defense budget  The service availability threshold for all nodes in the network  The predefined function of each node

2015/12/7NTU IM OPLab19 Given (cont ’ d)  The redundant component choice set of each kind of function  The defense mechanism choice set of each kind of redundant component  The cost of each kind of redundant component  The cost of each kind of extra defense mechanism available for each kind of redundant component  The threshold of compromising each kind of redundant component  The threshold of compromising each kind of extra defense mechanism available for each kind of redundant component  The probability of each kind of redundant component operating properly

2015/12/7NTU IM OPLab20 Objective  To maximize the minimized total attack cost  Subjected to The total cost spending on allocating redundant components and extra defense mechanisms must be no more than the limitation of total defense budget. The expected number of redundant components in each node must be no less than the service availability threshold. The node to be attacked must be connected to the existing attack tree.

2015/12/7NTU IM OPLab21 To determine  Defender Which redundant components and extra defense mechanisms in which nodes to allocate  Attacker Which redundant components and extra defense mechanisms in which nodes to compromise

RAP-EDM Model (Redundancy Allocation Problem with Extra Defense Mechanisms)

2015/12/7NTU IM OPLab23 Given parameters B The total defensive budgetary limitation N The index set of all nodes in the network T The index set of all core nodes in the network U The index set of all non-core nodes in the network F The index set of all functions provided by the nodes in the network MfMf The index set of all redundant components which can be selected to provide the same main function f, where f F W The index set of all Origin-Destination (O-D) pairs, where the origin is node s and the destination is the core node t, where t T

2015/12/7NTU IM OPLab24 Given parameters (cont ’ d) PwPw The index set of all candidate paths of an O-D pair w, where w W DmDm The index set of all extra defensive mechanisms available for the kind of redundant component m, where m M f, f F α The threshold of service availability assurance that defines the minimum expected number of redundant components for every node σ if The indicator function, which is 1 if node i provides function f, and 0 otherwise (where i N, f F) δ pi The indicator function, which is 1 if node i is on the path p, and 0 otherwise (where i N, p P w, w W)

2015/12/7NTU IM OPLab25 Given parameters (cont ’ d) cmcm The cost of the kind of redundant component m, where m M f, f F m (c m ) The threshold of the attack cost required to compromise the kind of redundant component m, where m M f, f F QmQm The probability of the kind of redundant component m that operates properly, where m M f, f F

2015/12/7NTU IM OPLab26 Given parameters (cont ’ d) c md The cost of the defensive mechanism d of the kind of redundant component m, where d D m, m M f, f F md (c md ) The threshold of the attack cost required to compromise the defensive mechanism d of the kind of redundant component m, where d D m, m M f, f F

2015/12/7NTU IM OPLab27 Decision variables R im 1 if the redundant component m is allocated in node i, and 0 otherwise (where m M f, f F, i N) R imd 1 if the defensive mechanism d of redundant component m is allocated in node i, and 0 otherwise (where d D m, m M f, f F, i N) yiyi 1 if node i is compromised, and 0 otherwise (where i N) y im 1 if the redundant component m in node i is compromised, and 0 otherwise (where m M f, f F, i N) y imd 1 if the defensive mechanism d of redundant component m in node i is compromised, and 0 otherwise (where d D m, m M f, f F, i N)

2015/12/7NTU IM OPLab28 Decision variables (cont ’ d) zmzm 1 if the attacker has compromised the kind of redundant component m so far, and 0 otherwise (where m M f, f F) z md 1 if the attacker has compromised the kind of defensive mechanism d of the kind of redundant component m so far, and 0 otherwise (where d D m, m M f, f F) xpxp 1 if path p is selected as the attack path, and 0 otherwise (where p P w, w W)

2015/12/7NTU IM OPLab29 Objective (IP 1) Attack cost for compromising all extra defense mechanisms protecting a redundant component Attack cost for really compromising a redundant component

2015/12/7NTU IM OPLab30 Subject to (IP 1.1) (IP 1.2) (IP 1.3) (IP 1.4) (IP 1.5) (IP 1.6) (IP 1.7)

2015/12/7NTU IM OPLab31 Subject to (cont ’ d) (IP 1.8) (IP 1.9) (IP 1.10) (IP 1.11) (IP 1.12) (IP 1.13)

2015/12/7NTU IM OPLab32 Subject to (cont ’ d) (IP 1.14) (IP 1.15) (IP 1.16) (IP 1.17) (IP 1.18) (IP 1.19)

2015/12/7NTU IM OPLab33 Subject to (cont ’ d) (IP 1.20) (IP 1.21)

AEA Model (Attack with Experience Accumulation)

2015/12/7NTU IM OPLab35 Given parameters B The total defensive budgetary limitation N The index set of all nodes in the network T The index set of all core nodes in the network U The index set of all non-core nodes in the network F The index set of all functions provided by the nodes in the network MfMf The index set of all redundant components which can be selected to provide the same main function f, where f F W The index set of all Origin-Destination (O-D) pairs, where the origin is node s and the destination is the core node t, where t T

2015/12/7NTU IM OPLab36 Given parameters (cont ’ d) PwPw The index set of all candidate paths of an O-D pair w, where w W DmDm The index set of all extra defensive mechanisms available for the kind of redundant component m, where m M f, f F σ if The indicator function, which is 1 if node i provides function f, and 0 otherwise (where i N, f F) δ pi The indicator function, which is 1 if node i is on the path p, and 0 otherwise (where i N, p P w, w W)

2015/12/7NTU IM OPLab37 Given parameters (cont ’ d) cmcm The cost of the kind of redundant component m, where m M f, f F m (c m ) The threshold of the attack cost required to compromise the kind of redundant component m, where m M f, f F c md The cost of the defensive mechanism d of the kind of redundant component m, where d D m, m M f, f F md (c md ) The threshold of the attack cost required to compromise the defensive mechanism d of the kind of redundant component m, where d D m, m M f, f F

2015/12/7NTU IM OPLab38 Given parameters (cont ’ d) R im 1 if the redundant component m is allocated in node i, and 0 otherwise (where m M f, f F, i N) R imd 1 if the defensive mechanism d of redundant component m is allocated in node i, and 0 otherwise (where d D m, m M f, f F, i N)

2015/12/7NTU IM OPLab39 Decision variables yiyi 1 if node i is compromised, and 0 otherwise (where i N) y im 1 if the redundant component m in node i is compromised, and 0 otherwise (where m M f, f F, i N) y imd 1 if the defensive mechanism d of redundant component m in node i is compromised, and 0 otherwise (where d D m, m M f, f F, i N)

2015/12/7NTU IM OPLab40 Decision variables (cont ’ d) zmzm 1 if the attacker has compromised the kind of redundant component m so far, and 0 otherwise (where m M f, f F) z md 1 if the attacker has compromised the kind of defensive mechanism d of the kind of redundant component m so far, and 0 otherwise (where d D m, m M f, f F) xpxp 1 if path p is selected as the attack path, and 0 otherwise (where p P w, w W)

2015/12/7NTU IM OPLab41 Objective (IP 2)

2015/12/7NTU IM OPLab42 Subject to (IP 2.1) (IP 2.2) (IP 2.3) (IP 2.4)

2015/12/7NTU IM OPLab43 Subject to (cont ’ d) (IP 2.5) (IP 2.6) (IP 2.7) (IP 2.8) (IP 2.9) (IP 2.10)

2015/12/7NTU IM OPLab44 Subject to (cont ’ d) (IP 2.11) (IP 2.12) (IP 2.13) (IP 2.14) (IP 2.15) (IP 2.16)

2015/12/7NTU IM OPLab45 Agenda  Introduction  Scenario  Problem Formulation  Lagrangean Relaxation Decomposition Heuristics for Getting Primal Feasible Solutions  Problems

2015/12/7NTU IM OPLab46 Lagrangean Relaxation  We turn the primal problem (IP 2) into the Lagrangean relaxation problem (LR 1) by relaxing the constraints (IP 2.1), (IP 2.5), (IP 2.6), (IP 2.7), (IP 2.8), (IP 2.11), (IP 2.12), (IP 2.13), and (IP 2.14).

2015/12/7NTU IM OPLab47 Optimization problem (LR 1) Only μ 3 is non-restricted, and all the other multipliers are non-negative.

2015/12/7NTU IM OPLab48 Subject to (LR 1.1) (LR 1.2) (LR 1.3) (LR 1.4) (LR 1.5) (LR 1.6) (LR 1.7)

2015/12/7NTU IM OPLab49 Decomposition  Subproblem 1.1 (related to decision variable x p )  Subproblem 1.2 (related to decision variable y i )  Subproblem 1.3 (related to decision variable y im, z m )  Subproblem 1.4 (related to decision variable y imd, z md )

2015/12/7NTU IM OPLab50 Subproblem 1.1 (related to decision variable x p )  (Sub 1.1)  Subject to: (Sub 1.1.1) (Sub 1.1.2)

2015/12/7NTU IM OPLab51 Subproblem 1.2 (related to decision variable y i )  (Sub 1.2)  Subject to (Sub 1.2.1)

2015/12/7NTU IM OPLab52 Subproblem 1.3 (related to decision variable y im, z m )  (Sub 1.3)  Subject to (Sub 1.3.1) (Sub 1.3.2)

2015/12/7NTU IM OPLab53 Subproblem 1.4 (related to decision variable y imd, z md )  (Sub 1.4)  Subject to (Sub 1.4.1) (Sub 1.4.2)

2015/12/7NTU IM OPLab54 Agenda  Introduction  Scenario  Problem Formulation  Lagrangean Relaxation Decomposition Heuristics for Getting Primal Feasible Solutions  Problems

2015/12/7NTU IM OPLab55 Heuristics for Getting Primal Feasible Solutions  Step 1 The defender initializes a network that conforms to all the related constraints.  Defense Budget (B)  Functions of nodes  Service continuity requirement (α)

2015/12/7NTU IM OPLab56 Heuristics for Getting Primal Feasible Solutions (cont’d)  Step 1.1 Build a tree from node s to all core nodes by using Dijkstra’s algorithm.  Step 1.2 Allocate redundant components to the nodes on the tree.

2015/12/7NTU IM OPLab57 Heuristics for Getting Primal Feasible Solutions (cont’d)  Step 1.2 Step  Allocate the combinations of the most expensive redundant components to different-functioned core nodes. Step  Allocate the combinations of the redundant components with the second high level price to 1 hop away non-core nodes from node s. Step  Allocate the combinations of the redundant components with the third high level price to 1 hop away non-core nodes from the core nodes. Step  Allocate the redundant components that were not used in the above steps to the remained non-core nodes.

2015/12/7NTU IM OPLab58 Heuristics for Getting Primal Feasible Solutions (cont’d)  Step 1.3 Considering the diversity, allocate the cheapest combinations of redundant components to the remained non-core nodes that were not on the tree.

2015/12/7NTU IM OPLab59 Heuristics for Getting Primal Feasible Solutions (cont’d)  Step 1.4 Allocate corresponding defense mechanisms for protecting redundant components to the nodes.  Consider the diversity.  Follow the order used in the above steps. The nodes on the tree  The Core nodes  The 1 hop away non-core nodes from node s  The 1 hop away non-core nodes from the core nodes  The remained non-core nodes The other nodes

Heuristics for Getting Primal Feasible Solutions (cont’d)  Step 2 The attacker decides the initial attack tree according to the results of solving sub 1.1.  Step 3 Compromise all core nodes, i.e., compromise all redundant components with defense mechanisms within them.  Step 4 According to the results of Step 2 and Step 3, the attacker decides which redundant components (with defense mechanisms) to compromise in the non-core nodes that belong to the initial attack tree.

2015/12/7NTU IM OPLab61 Another Heuristics for Getting Primal Feasible Solutions  Step 1 The defender initializes a network just like we mentioned before.  Step 2 Let all the core nodes be compromised.

2015/12/7NTU IM OPLab62 Another Heuristics for Getting Primal Feasible Solutions (cont ’ d)  Step 3 Set a weight for each non-core node, and the weight includes three parts:  μ 3 of subproblem 1.2subproblem 1.2  The expected value of attack cost for each non-core node  Each non-core node’s importance of connection

 The expected value of attack cost for each non-core node Another Heuristics for Getting Primal Feasible Solutions (cont ’ d) 2015/12/7NTU IM OPLab63 Attack cost = 10 Frequency = 5 Attack cost = 3 Frequency = 6 Attack cost= 12 Frequency = 4 Exp(Attack cost) = 10/5 + 3/6 + 12/4 = Total hops = = 9

2015/12/7NTU IM OPLab64 Another Heuristics for Getting Primal Feasible Solutions (cont ’ d)  Step 4 From each core node, build up an attack path to the starting node s.  Choose a direct neighbor node with smallest weight to compromise each time. If there is a compromised node within direct neighbors, reuse it as a hop site. If a neighbor node includes the kinds of redundant components or defense mechanisms that have been compromised before, their attack cost are then set to 0.

2015/12/7NTU IM OPLab65 Agenda  Introduction  Scenario  Problem Formulation  Lagrangean Relaxation Decomposition Heuristics for Getting Primal Feasible Solution  Problems

2015/12/7NTU IM OPLab66 Problems  How to properly set those given parameters? The number of different functions The sizes of  redundant component choice set  defense mechanism choice set The relation between c m, m (c m ), and Q m The relation between c md and md (c md )

Thanks for your listening!