Defense strategies for asymmetric networked systems under composite utilities
- ORNL
- Hang Seng Management College, Hon Kong
- University of Stavanger, Norway
- Texas A&M University, Kingsville, TX, USA
- Singapore University of Technology and Design
- University at Buffalo (SUNY)
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively. They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure
- Research Organization:
- Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
- Sponsoring Organization:
- USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR); USDOE National Nuclear Security Administration (NNSA)
- DOE Contract Number:
- AC05-00OR22725
- OSTI ID:
- 1399416
- Resource Relation:
- Conference: IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems - Daegu, , South Korea - 11/27/2017 5:00:00 AM-11/29/2017 5:00:00 AM
- Country of Publication:
- United States
- Language:
- English
Similar Records
Game-theoretic strategies for asymmetric networked systems
Defense strategies for cloud computing multi-site server infrastructures