Abstract
In this paper, a multi-stage attack-defense model is proposed. We consider cyber attackers and network defenders with complete understanding of the information about each other. In general, in the strategic interaction between cyber attackers and network defenders, both parties repeatedly interact with each other. These interactions should thus not be one-stage but multi-stage. From the network defenders’ view, this model is used to support network operators and to predict all the likely strategies used by both cyber attacker and network defender. As a result, the Average Degree of Disconnectivity (Average DOD) is provided as a survivability metric for evaluating the residual network after malicious attacks. To solve the problem, a gradient method and game theory is adopted to find the optimal resource allocation strategies for both cyber attackers and network defenders.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Westmark, V.R.: A Definition for Information System Survivability. In: Proc. HICSS 12 (2004)
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013 (November 1997)
Lin, F.Y.S., Yen, H.H., Chen, P.Y., Wen, Y.F.: Evaluation of Network Survivability Considering Degree of Disconnectivity. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS (LNAI), vol. 6678, pp. 51–58. Springer, Heidelberg (2011)
Lin, F.Y.S., Chen, P.Y., Chen, Q.T.: Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD. In: Proc. DCAI 2012 (2012)
Skaperdas, S.: Contest Success Functions. Economic Theory (1996)
Jiang, W., Fang, B.X., Zhang, H.L., Tian, Z.H.: A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. In: Proc. CIS 2007 (2007)
Jiang, W., Fang, B.X., Zhang, H.L., Tian, Z.H.: Optimal Network Security Strengthening Using Attack-Defense Game Model. In: Proc. ITNG 2009 (2009)
Lin, Y.S., Tsang, P.H., Chen, C.H., Tseng, C.L., Lin, Y.L.: Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. In: Proc. ARES 2005 (2005)
Lin, F.Y.-S., Yen, H.-H., Chen, P.-Y., Wen, Y.-F.: Evaluation of Network Survivability Considering Degree of Disconnectivity. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS (LNAI), vol. 6678, pp. 51–58. Springer, Heidelberg (2011)
Lin, F.Y.S., Chen, P.Y., Wang, Y.S., Chang, Y.Y.: Network Recovery Strategies for Maximization of Network Survivability under Malicious Attacks. In: Proc. IEEE IWCMC 2011 (2011)
Levitin, G., Hausken, K.: Parallel Systems under Two Sequential Attacks. Reliability Engineering and System Safety 94(3), 763–772 (2009)
Levitin, G., Hausken, K.: Resource Distribution in Multiple Attacks against a Single Target. Risk Analysis 30(8), 1231–1239 (2010)
Levitin, G., Hausken, K.: Protection vs. False Targets in Series Systems. Reliability Engineering and System Safety 94(5), 973–981 (2009)
Hassoun, H.: Fundamentals of Artificial Neural Networks. MIT Press (1995)
Owen, G.: Game Theory, 3rd edn. Academic Press (2001)
Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, F.YS., Chen, PY., Chen, QT. (2012). Near-Optimal Evaluation of Network Survivability under Multi-stage Attacks. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds) Advanced Research in Applied Artificial Intelligence. IEA/AIE 2012. Lecture Notes in Computer Science(), vol 7345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31087-4_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-31087-4_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31086-7
Online ISBN: 978-3-642-31087-4
eBook Packages: Computer ScienceComputer Science (R0)