Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1.  1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource.

Slides:



Advertisements
Similar presentations
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung.
Advertisements

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
Variance reduction techniques. 2 Introduction Simulation models should be coded such that they are efficient. Efficiency in terms of programming ensures.
EE 553 Integer Programming
DATA SURVIVABILITY VS. SECURITY IN INFORMATION SYSTEMS Gregory Levitin a,b,n, Kjell Hausken c, Heidi A. Taboada d, David W. Coit Presented by Chia-Ling.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/10/25 1 Research Direction Introduction.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Uncertainty and Consumer Behavior
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Social Choice Theory By Shiyan Li. History The theory of social choice and voting has had a long history in the social sciences, dating back to early.
Unintentional vs. intentional impacts No impact strategy Attacker’s strategy maximizing the expected damage.
Tirgul 8 Universal Hashing Remarks on Programming Exercise 1 Solution to question 2 in theoretical homework 2.
Segmenting, Targeting and Product Positioning Pertemuan 9 Matakuliah: J0114/Manajemen Pemasaran Tahun: 2008.
Evolving Strategies for Contentious but Efficient Coexistence in Unlicensed Bands N. Clemens C. Rose WINLAB.
Game Theory.
Sebastian Bitzer Seminar Constraint Logic Programming University of Osnabrueck November 11 th 2002 The Simplex Algorithm.
BCOR 1020 Business Statistics
Risk Management.
Reliability-Redundancy Allocation for Multi-State Series-Parallel Systems Zhigang Tian, Ming J. Zuo, and Hongzhong Huang IEEE Transactions on Reliability,
To Start: 10 Points!!! Simplify and Evaluate: (-4)5 =(-4)(-4)(-4)(-4)(-4) = -4,096!! 2x3 + 4y, for x=-3 and y=2 2(-3)3 + 4(2) 2(-27) !!!!
14. Introduction to inference
The problem of sampling error It is often the case—especially when making point predictions—that what we observe differs from what our theory predicts.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
1 ECGD3110 Systems Engineering & Economy. 2 Lecture 1 Introduction to Engineering Economics.
ROBUST RESOURCE ALLOCATION OF DAGS IN A HETEROGENEOUS MULTI-CORE SYSTEM Luis Diego Briceño, Jay Smith, H. J. Siegel, Anthony A. Maciejewski, Paul Maxwell,
Nash equilibrium Nash equilibrium is defined in terms of strategies, not payoffs Every player is best responding simultaneously (everyone optimizes) This.
Prices and Quantities in a Climate Policy Setting Svante Mandell.
1 ECGD4214 Systems Engineering & Economy. 2 Lecture 1 Part 1 Introduction to Engineering Economics.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
SYSTEM RELIABILITY OPTIMIZATION CONSIDERING UNCERTAINTY: MINIMIZATION OF THE COEFFICIENT OF VARIATION FOR SERIES- PARALLEL SYSTEMS Hatice Tekiner-Mogulkoc,
Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan 2011/3/281.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
1 Ss. Colman-John Neumann Basketball Survey 2008/2009.
BLAST: Basic Local Alignment Search Tool Altschul et al. J. Mol Bio CS 466 Saurabh Sinha.
Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1.
Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall 9-1 σ σ.
O PTIMAL SERVICE TASK PARTITION AND DISTRIBUTION IN GRID SYSTEM WITH STAR TOPOLOGY G REGORY L EVITIN, Y UAN -S HUN D AI Adviser: Frank, Yeong-Sung Lin.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers Advisor: Professor.
Lecture 6 Decision Making.
Author: Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Defender Message Strategies to Maximize Network Survivability for Multi-Stage Defense Resource.
1 Optimizing Decisions over the Long-term in the Presence of Uncertain Response Edward Kambour.
Machine Learning 5. Parametric Methods.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih Defending against multiple different attackers Kjell Hausken, Vicki M. Bier 2011/3/14 1.
論文進度報告 Advisor: Professor Frank Y.S. Lin Presented by G.W. Chen 陳冠瑋.
Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010.
On Investor Behavior Objective Define and discuss the concept of rational behavior.
Research Direction Introduction
Adversarial Search 2 (Game Playing)
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Optimal Network Protection Against Diverse Interdictor Strategies Jose E. Ramirez-Marquez, Claudio M. Rocco, Gregory Levitin Advisor : Professor Frank.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
S URVIVABILITY OF SYSTEMS UNDER MULTIPLE FACTOR IMPACT E DWARD K ORCZAK, G REGORY L EVITIN Adviser: Frank,Yeong-Sung Lin Present by Sean Chou 1.
Linear Programming for Solving the DSS Problems
Defense and attack of complex and dependent systems
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Considering Multi-objective Resource Allocation Strategies under Attack-Defense Roles and Collaborative Attacks 考慮攻防雙角色與協同攻擊情況下之多目標資源分配策略 Advisor: Frank,Yeong-Sung.
The Practice of Statistics in the Life Sciences Fourth Edition
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷
Optimal defence of single object with imperfect false targets
Presentation transcript:

Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 2

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 3

 An attacker tries to maximize the system vulnerability.  The attacker distributes its constrained resource optimally across two attacks.  The attacker can choose the number of elements to be attacked in the first attack.  The attacker observes which elements are destroyed and not destroyed in the first attack, and applies its remaining resource into attacking the remaining elements in the second attack. 4

 We consider a 1-out-of-N system which means that all elements have to be destroyed to ensure a non-functioning system.  The defender distributes its constrained resource between deploying redundant elements and protecting them against the attack. 5

6

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 7

 The vulnerability of an element that is attacked is determined by a contest between the defender and the attacker.  Contest success function : 8

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 9

 Two identical separated parallel elements. (N=2)  The total attacker’s resource equals the total defender’s resource: r=R.  The defender allocates the same resource r/2 to protection of each element.  If the attacker attacks several elements, it distributes its resource evenly among the elements 10

 First scenario : the attacker uses all its resources in the single attack. 1.The element vulnerability is 2.The probability that both elements are destroyed is v 2 =

R DefenderAttacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/2 12

 Second scenario : the attacker distributes its resources evenly between two attacks. 1.The element vulnerability is 2. Three possible outcomes of attack A. Two elements are destroyed of first attack with probability w 2. 13

DefenderAttacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/4 R/2 14

2. Three possible outcomes of attack B. One element is destroyed of first attack with probability 2(1-w)w. One element is destroyed of second attack with probability v.(Attacker attacks the remaining single element with all its remaining resource R/2) Both attack with probability 2(1-w)w‧v=(1-w)w 15

DefenderAttacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/4 R/2 T=R/2 16

2. Three possible outcomes of attack C. Two elements are not destroyed of first attack with probability (1-w) 2. Two elements are destroyed of second attack with probability w 2. Both attack with probability (1-w) 2 w 2. 17

DefenderAttacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/4 R/2 T=R/4 18

 Since three possible outcomes of attack are mutually exclusive scenarios, the overall probability of system destruction in a double attack is  The double attack with even resource distribution is beneficial if the system vulnerability in double attack exceeds this probability in single attack: 19

 It can be seen that the double attack with even resource distribution is beneficial for m<= m=1.82 r/R=1

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 21

 The attacker allocates a part xR of its resource in the first attack, and the remaining part (1-x)R in the second attack. (0< x <=1)  The element vulnerability in the first attack is  If one element is destroyed in the first attack, the remaining attacker’s resource per element is (1-x)R. 22

DefenderAttacker Entire attacker’s resource=R t=r/2 T=xR/2 xR (1-x)R 23 N =2 Entire defender’s resource=r

 If both elements survive the first attack,the remaining attacker’s resource per element is(1-x)R/2.  The overall system vulnerability 24

25 m 較小時,平均 分配資源至兩次 攻擊 m 較大時,集中資 源至某一次攻擊 m 小m 小 m 大m 大 r=R

for r/R=0.5, m*= 3.06; for r/R=1, m* =1.87;and for r/R=2, m*=1.6 When m>m* the double attack cannot provide greater system vulnerability than single attack for any attacker’s resource distribution x. (ex. r/R=1) 26

presents m* (the maximal value of m when double attack remains beneficial)as a function of r/R. 27 Double attack Single attack

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 28

 The attacker attacks only one out of two elements.  The first attack allocating the resource xR to one element.  The element vulnerability in the first attack is 29

DefenderAttacker Entire attacker’s resource=R t=r/2 T=xR T=(1-X)R xR (1-x)R 30 N =2 Entire defender’s resource=r

 The overall system vulnerability is ref: 31

32 m 小,攻擊者 會頃向選擇所 有 elements elements m 大,攻擊者 會頃向選擇部 分 elements r/R=1

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 33

 The attacker chooses x and the number Q of elements to attack in the first attack optimally.  The attacker can distribute its resource unevenly across the two attacks, and evenly across those elements it chooses to attack in each of the two attacks.  The element vulnerability in the first attack is 34

 The probability that exactly j (0<=j<=Q) elements are destroyed by the first attack is  The probability of system destruction is 35

 The attacker seeks for x and Q that maximize V(x,Q). 36

37 1. If m is high, the attacker prefers to attack the partial elements. If m is low, the attacker prefers to attack all elements. 2. A highly intensive contest and constant N the choice of x plays no important role. N=4

38 1. If m is high, the attacker prefers to attack the partial elements. If m is low, the attacker prefers to attack all elements. 2. The attacker’s effort decreases as N increases, but decreasing x* when Q* is constant means that the attacker increases its per element effort in the second attack r/R=1

 if the attacker can choose 1. how many elements to attack in the first attack, 0<=Q<=N, 2. how to distribute its effort between the two attacks, 0<x<=1 then a single attack is never preferable 39

 Concentrating all its resource on a single attack  Hypothetically, it achieves the same per element effort xR/Q=R/N in the first attack (x=Q/N) 40

 which is always greater than V=v(R/N,r/N) N achieved in the single attack. 41 j=Q 時

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 42

 The defender choose the number of elements N and distribute its resource r between deploying N elements and protecting these N elements.  Observe that 1<=N<= └ r/y ┘, where └ r/y ┘ is the greatest integer that does not exceed r/y.  The resource remaining for protection is r-Ny 43

 The optimal values x*, Q*, and N* are determined by the following enumerative minmax procedure. 44

45 y/R=0.2

46 r/R=2

 1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements  3.General model of the optimal attack  4.Defender’s minmax strategy  5.Conclusions 47

 The attacker can decide whether to concentrate its limited resource on a single attack or distribute it among two attacks.  The defender distributes its limited resource among deploying redundant elements and protecting them against attacks.  The defender chooses the strategy that minimizes the maximal system vulnerability that the attacker can achieve using its optimal strategy. 48

 The presented model uses the contest intensity parameter m that cannot be exactly evaluated in practice.  Two ways of handling the uncertainty of the contest intensity can be outlined : A. m can be defined as a fuzzy variable and fuzzy logic model can be studied. B. the range of possible variation of m takes the values that are most favorable for the attacker. 49

Thanks for your listening. 50