Skip to main content

Near-Optimal Evaluation of Network Survivability under Multi-stage Attacks

  • Conference paper
  • 2651 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7345))

Abstract

In this paper, a multi-stage attack-defense model is proposed. We consider cyber attackers and network defenders with complete understanding of the information about each other. In general, in the strategic interaction between cyber attackers and network defenders, both parties repeatedly interact with each other. These interactions should thus not be one-stage but multi-stage. From the network defenders’ view, this model is used to support network operators and to predict all the likely strategies used by both cyber attacker and network defender. As a result, the Average Degree of Disconnectivity (Average DOD) is provided as a survivability metric for evaluating the residual network after malicious attacks. To solve the problem, a gradient method and game theory is adopted to find the optimal resource allocation strategies for both cyber attackers and network defenders.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Westmark, V.R.: A Definition for Information System Survivability. In: Proc. HICSS 12 (2004)

    Google Scholar 

  2. Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013 (November 1997)

    Google Scholar 

  3. Lin, F.Y.S., Yen, H.H., Chen, P.Y., Wen, Y.F.: Evaluation of Network Survivability Considering Degree of Disconnectivity. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS (LNAI), vol. 6678, pp. 51–58. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Lin, F.Y.S., Chen, P.Y., Chen, Q.T.: Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD. In: Proc. DCAI 2012 (2012)

    Google Scholar 

  5. Skaperdas, S.: Contest Success Functions. Economic Theory (1996)

    Google Scholar 

  6. Jiang, W., Fang, B.X., Zhang, H.L., Tian, Z.H.: A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. In: Proc. CIS 2007 (2007)

    Google Scholar 

  7. Jiang, W., Fang, B.X., Zhang, H.L., Tian, Z.H.: Optimal Network Security Strengthening Using Attack-Defense Game Model. In: Proc. ITNG 2009 (2009)

    Google Scholar 

  8. Lin, Y.S., Tsang, P.H., Chen, C.H., Tseng, C.L., Lin, Y.L.: Evaluation of Network Robustness for Given Defense Resource Allocation Strategies. In: Proc. ARES 2005 (2005)

    Google Scholar 

  9. Lin, F.Y.-S., Yen, H.-H., Chen, P.-Y., Wen, Y.-F.: Evaluation of Network Survivability Considering Degree of Disconnectivity. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS (LNAI), vol. 6678, pp. 51–58. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Lin, F.Y.S., Chen, P.Y., Wang, Y.S., Chang, Y.Y.: Network Recovery Strategies for Maximization of Network Survivability under Malicious Attacks. In: Proc. IEEE IWCMC 2011 (2011)

    Google Scholar 

  11. Levitin, G., Hausken, K.: Parallel Systems under Two Sequential Attacks. Reliability Engineering and System Safety 94(3), 763–772 (2009)

    Article  Google Scholar 

  12. Levitin, G., Hausken, K.: Resource Distribution in Multiple Attacks against a Single Target. Risk Analysis 30(8), 1231–1239 (2010)

    Article  Google Scholar 

  13. Levitin, G., Hausken, K.: Protection vs. False Targets in Series Systems. Reliability Engineering and System Safety 94(5), 973–981 (2009)

    Article  Google Scholar 

  14. Hassoun, H.: Fundamentals of Artificial Neural Networks. MIT Press (1995)

    Google Scholar 

  15. Owen, G.: Game Theory, 3rd edn. Academic Press (2001)

    Google Scholar 

  16. Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, F.YS., Chen, PY., Chen, QT. (2012). Near-Optimal Evaluation of Network Survivability under Multi-stage Attacks. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds) Advanced Research in Applied Artificial Intelligence. IEA/AIE 2012. Lecture Notes in Computer Science(), vol 7345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31087-4_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31087-4_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31086-7

  • Online ISBN: 978-3-642-31087-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics