Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010.

Slides:



Advertisements
Similar presentations
QoS-based Management of Multiple Shared Resources in Dynamic Real-Time Systems Klaus Ecker, Frank Drews School of EECS, Ohio University, Athens, OH {ecker,
Advertisements

Operations Scheduling
Contests with multiple rounds Huseyin Yildirim Heriberto Gonzalez November 2007.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung.
Introduction to Game Theory
Introduction to Economics Eco 101
Seminar in Auctions and Mechanism Design Based on J. Hartline’s book: Approximation in Economic Design Presented by: Miki Dimenshtein & Noga Levy.
Sta220 - Statistics Mr. Smith Room 310 Class #14.
Two-Player Zero-Sum Games
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
DATA SURVIVABILITY VS. SECURITY IN INFORMATION SYSTEMS Gregory Levitin a,b,n, Kjell Hausken c, Heidi A. Taboada d, David W. Coit Presented by Chia-Ling.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/10/25 1 Research Direction Introduction.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
ASYMPTOTIC PROPERTIES OF ESTIMATORS: PLIMS AND CONSISTENCY
Lecture Presentation Software to accompany Investment Analysis and Portfolio Management Seventh Edition by Frank K. Reilly & Keith C. Brown Chapter.
OPTIMAL PRESENT RESOURCE EXTRACTION UNDER THE INFLUENCE OF FUTURE RISK Professor Dr Peter Lohmander SLU, Sweden,
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Nov 2003Group Meeting #2 Distributed Optimization of Power Allocation in Interference Channel Raul Etkin, Abhay Parekh, and David Tse Spectrum Sharing.
Unintentional vs. intentional impacts No impact strategy Attacker’s strategy maximizing the expected damage.
Optimal Survivability Enhancement in Complex Vulnerable systems Gregory Levitin The Israel Electric Corporation Ltd.
Reliability-Redundancy Allocation for Multi-State Series-Parallel Systems Zhigang Tian, Ming J. Zuo, and Hongzhong Huang IEEE Transactions on Reliability,
Game theoretic models for detecting network intrusions OPLab 1.
Introduction to Statistical Inferences
Some Background Assumptions Markowitz Portfolio Theory
1 Combined Accumulation- and Decumulation Plans with Risk- Controlled Capital Protection 13th International AFIR Colloquium Maastricht, September 17th.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
© Markus Rudolf Page 1 Intertemporal Surplus Management BFS meeting Internet-Page: Intertemporal Surplus Management 1. Basics.
Nina H. Fefferman, Ph.D. Rutgers Univ. Balancing Workforce Productivity Against Disease Risks for Environmental and Infectious.
Sponsor: Dr. K.C. Chang Tony Chen Ehsan Esmaeilzadeh Ali Jarvandi Ning Lin Ryan O’Neil Spring 2010.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Investment Analysis and Portfolio Management First Canadian Edition By Reilly, Brown, Hedges, Chang 6.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
Chin-Yu Huang Department of Computer Science National Tsing Hua University Hsinchu, Taiwan Optimal Allocation of Testing-Resource Considering Cost, Reliability,
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Chapter 3 Consumer Behavior. Chapter 3: Consumer BehaviorSlide 2 Topics to be Discussed Consumer Preferences Budget Constraints Consumer Choice Marginal.
Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Author: Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
1 BA 555 Practical Business Analysis Linear Programming (LP) Sensitivity Analysis Simulation Agenda.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Chapter 7 An Introduction to Portfolio Management.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih Defending against multiple different attackers Kjell Hausken, Vicki M. Bier 2011/3/14 1.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1.  1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource.
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
CHAPTER 4 ESTIMATES OF MEAN AND ERRORS. 4.1 METHOD OF LEAST SQUARES I n Chapter 2 we defined the mean  of the parent distribution and noted that the.
Structural & Multidisciplinary Optimization Group Deciding How Conservative A Designer Should Be: Simulating Future Tests and Redesign Nathaniel Price.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
Optimal Network Protection Against Diverse Interdictor Strategies Jose E. Ramirez-Marquez, Claudio M. Rocco, Gregory Levitin Advisor : Professor Frank.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
 This will explain how consumers allocate their income over many goods.  This looks at individual’s decision making when faced with limited income and.
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
How Much and On What? Defending and Deterring Strategic Attackers
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Faculty of Engineering and Physical Sciences
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷
Optimal defence of single object with imperfect false targets
Presentation transcript:

Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010

Agenda Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

Introduction & Background It has been common to consider a nonstrategic attacker, either by assuming a fixed attack or a fixed attack probability. Bier et al. (1) assume that a defender allocates defense to a collection of locations while an attacker chooses a location to attack.

Introduction & Background In this article, we consider a target (object) that a defender seeks to protect and an attacker seeks to destroy through multiple sequential attacks. The defender tries to keep the object undestroyed in each attack launched by the attacker.The phenomenon is modeled as a contest between a defender and an attacker.

Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

Problem Description Basic definitions: – Vulnerability: Probability of target destruction by the attacker. – Effort: Amount of intentional force aimed at destruction or protection of a system element (in this article, it is measured as the amount of attacker’s resource allocated to each attack and amount of defender’s resource allocated to defense)

Problem Description 1. Whether the attacker should allocate its entire resource into one large attack or distribute it among several attacks.

Problem Description 1. Whether the attacker should allocate its entire resource into one large attack or distribute it among several attacks. Attack strategy One large attack Several attacks

Problem Description

Attack strategy One large attack Several attacks Even Resource Distribution Geometric Resource Distribution

Problem Description 2.Whether geometrically increasing or decreasing resource distribution into a fixed number of sequential attacks is more beneficial than equal resource distribution Attack strategy One large attack Several attacks Even Resource Distribution Geometric Resource Distribution Geometrically increasing Geometrically decreasing

Problem Description 3.How the optimal attack strategy depends on the contest intensity(m). Two objectives: – 1.To maximize the target vulnerability(V). – 2.To minimize the expected attacker resource expenditure(E).

Optimal attack straregy Problem Description 3.How the optimal attack strategy depends on the contest intensity(m). Attack strategy One large attack Several attacks Even Resource Distribution Geometric Resource Distribution Geometrically increasing Geometrically decreasing

Introduction Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

The model- Assumption Assumption: – (1) We consider a target (single target) that a defender seeks to protect and an attacker seeks to destroy through multiple sequential attacks. – (2)Both the defender and the attacker have limited resources. – (3)The attacker can observe the outcome of each attack and stop the sequence of attacks when the target is destroyed. – (4)The attacker distributes its resource over time.

The model- Assumption Assumption: – (5)We model the common case that the protection is static and cannot be changed over time. Target is destroyed->The protection is destroyed. Target is not destroyed->the protection remains in place also for the subsequent attack. – (6) We assume that the defender uses the same protection during the series of K attacks and allocates its entire resource into this protection.

Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

Target vulnerability(V) For any single attack, the vulnerability of a target is determined by a contest between the defender exerting effort t and the attacker exerting effort T in this attack. ->Contest success function

Target vulnerability(V) Contest success function :The attack success probability. T :Attacker’s effort to attack a target. t :Defender’s effort to protect a target. m: Attacker-defender contest intensity.

Target vulnerability(V) Contest success function Two factors influence the : – 1.The relation between the resources(t/T) in each attack. – 2.Contest intensity m.

Target vulnerability(V) 1.The relation between the resources(t/T) in each attack. – If the attacker exerts high effort(T>t), it is likely to win the contest that gives high vulnerability. – If the defender exerts high effort(T<t), it is likely to win the contest that gives low vulnerability.

Target vulnerability(V) 2.Contest intensity m : Measures whether the agents’ efforts have low or high impact on the target vulnerability

Target vulnerability(V) According to assumption (6), We assume that the defender uses the same protection during the series of K attacks and allocates its entire resource into this protection: t=r NOMENCLATURE t :Defender’s effort to protect a target r :Defender’s resource

Target vulnerability(V) On the contrary, the attacker distributes its entire resource R among K attacks such that the resource allocated to attack NOMENCLATURE R :Attacker’s resource :Attacker’s effort (resource used) in the th attack K :Number of consecutive attacks

Target vulnerability(V) The success probability of the th attack according to Contest success function is: The probability that the target survives in th attacks is:

Target vulnerability(V) The probability that the target survives all K attacks is: Thus, the target vulnerability in K attacks is:

Expenditure(E) According to assumption (3), The attacker can observe the outcome of each attack and stop the sequence of attacks when the target is destroyed. If the target is destroyed in the attack, the attacker spends the resource:

Expenditure(E) NOMENCLATURE T : attacker’s effort (resource used) in the attack(for even resource distribution T ≡ T) If the probability that the target is destroyed in the th attack is,the expected attacker’s resource expenditure can be obtained as:

Expenditure(E) If the target is destroyed in the th attack, the resource attacker spends.

Expenditure(E) The expected attacker’s resource expenditure when target is destroyed.

Expenditure(E) The probability that the target survives all K attacks.

Expenditure(E) The expected attacker’s resource expenditure when after K attacks the attacker fails to destroy the target.

Expenditure(E) The expected attacker’s resource expenditure can be obtained as: We will present the expected resource expenditure as a fraction of the total of attacker’s resource(R):

Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

Even Resource Distribution-V The attacker can choose the number of attacks K and distribute its resource evenly among the attacks such that T = R/K and the probability of target destruction in any attack is: =K/R *r = 1/T *r=r/T

Even Resource Distribution-V The target vulnerability is: Even resource distribution ->1- are equal in all K attacks,so

Even Resource Distribution-V Parameter values exist where the derivative in Equation (6) is negative, but it is often positive.

Even Resource Distribution-V Example: – Negative: (m = 2, R = r)

Even Resource Distribution-V Example: – Positive: (m = 0 ; m=1,R=r )

Even Resource Distribution-V m = 0,V increases concavely from 0 to 1 as a function of K and the attacker benefits from unlimitedly increasing the number of attacks. In realistic situations, the number of attacks is limited by time constraints by limited minimal cost of a single attack, etc. Therefore, the upper limit of K always exists.

Even Resource Distribution-V Fig. 1 presents the target vulnerability as a function of the contest intensity m for different K and r/R.

Even Resource Distribution-V It can be seen that the smaller the contest intensity(m), the more beneficial it is to increase the number of attacks.

Even Resource Distribution-E If the target is destroyed in the th attack, the probability of this event is: The probability that the target survives in all -1 attacks. The probability that the target is destroyed.

Even Resource Distribution-E The attacker spends the resource T =R/K*. * T

Even Resource Distribution-E R/K* R* R/T* *

Even Resource Distribution-E Fig. 2 presents the expected attacker’s resource expenditure as a function of the contest intensity m for different r/R.

Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

Geometric Resource Distribution-V Now we assume that the attacker can change the amount of resources allocated to each of the K attacks. To model the resource distribution, we use the geometric progression since it is simple and flexible.

Geometric Resource Distribution-V Assume that the attacker allocates effort to the first attack and changes the effort according to the geometric progression.

Geometric Resource Distribution-V The parameter q(Attack effort variation factor) determines the strategy of effort variation through the K sequential attacks:

Geometric Resource Distribution-V Attack strategy One large attack q=0 Several attacks Even Resource Distribution q=1 Geometric Resource Distribution Geometricall y increasing q>1 Geometricall y decreasing q<1

Geometric Resource Distribution-V For the given resource R and effort variation parameter q, we obtain:

Geometric Resource Distribution-V We obtain the probability of success in the th attack as:

Geometric Resource Distribution-V The total system vulnerability in K sequential attacks with effort variation parameter q is:

Geometric Resource Distribution-E The probability that the target is destroyed in the th attack is: Thus, the expected resource expenditure is:

Geometric Resource Distribution-E Fig. 3 illustrates how maximum target vulnerability and minimum resource expenditure can be competing attacker objectives.

Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

Numerical simulations For low contest intensity m = 0.5 – Maximal V: q=1 (Even distribution) V=0.842 E=0.545 – Minimal E: q=1.79 E=0.47 V=0.8175

Numerical simulations For high contest intensity m = 2 – Maximal V: q=0 (Single attack) V=0.5 E=1 – Minimal E: q=0.47 E= V=0.2875

Numerical simulations Using numerical simulations to demonstrate the methodology of model analysis. Fig. 4 presents the values of q and K that maximize V and the values of q and K that minimize E and the corresponding values of V and E as functions of m for different values of the ratio r/R and K is allowed to vary from 1 to 10. There is a reasonable upper limit of K, which we here set to 10.

Numerical simulations-Maximal V r/R=0.5 r/R=1 r/R=2

Numerical simulations-Maximal V r/R=0.5 m 1 = 1.08 The optimal number of attacks is maximal for m < m 1

Numerical simulations-Maximal V For m> m 2, the single attack with K = 1 and q = 0 becomes preferable for the attacker. m 2 = 1.6

Numerical simulations-Maximal V r/R=0.5 r/R=1 r/R=2

Numerical simulations-Maximal V The optimal number of attacks is maximal for m < m 1 (where for r/R = 0.5 m 1 = 1.08, for r/R = 1 m 1 = 1.04, and for r/R = 2 m 1 = 1.02). Then it drops gradually and for m < m 2 (where for r/R = 0.5 m 2 = 1.6, for r/R = 1 m 2 = 1.28, and for r/R = 2 m 2 = 1.16) the single attack with K = 1 and q = 0 becomes preferable for the attacker. The values of q between 1 and 0 are never optimal when the system vulnerability is maximized.

Numerical simulations-Minimal E r/R=0.5 r/R=1r/R=2

Numerical simulations-Minimal E For low contest intensities the attack effort should increase through the K attacks (q > 1), whereas for more intensive contests it should decrease (q < 1).

Numerical simulations-Optimal r/R=0.5r/R=1 r/R=2

Numerical simulations-Optimal The attacker needs to strike a V versus E balance (tradeoff) for the attack strategy. Fig. 5 presents the differences in V and E obtained for strategies maximizing V and minimizing E.

Numerical simulations-Optimal

For m = 0.3(Low intensity), E can be reduced by 51.4% by the price of a 1.6% decrease of V. Move from 0.3->1

Numerical simulations-Optimal On the contrary, when m = 3(High intensity), E can be reduced by only by 7.74%, which causes 49% decrease of V. Move from 3->1

Numerical simulations-Optimal When the contest intensity is low, a great reduction of E without significant sacrifice of V is possible. Highly intensive contests even a small reduction of E causes a drastic reduction of V. The benefit of choosing the minE strategy for small m increases with the growth of the attacker’s resource superiority (decrease of r/R).

Numerical simulations-Optimal

Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution Even Resource Distribution(V,E) Geometric Resource Distribution(V,E) Numerical simulations Conclusion

When the contest intensity is low, the attacker benefits from distributing its resource among several attacks and attacking the target with an effort that increases for each subsequent attack. For highly intensive contests, concentrating the entire attacker’s effort in one single attack is preferable.