6th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications

Research Article

Maximization of Multi-Round Network Survivability under Considerations of the Defender’s Defensive Messaging Strategies

Download318 downloads
  • @INPROCEEDINGS{10.4108/icst.mobilware.2013.254294,
        author={Pei Yu Chen and I Ju Shih and Frank Yeong-Sung Lin},
        title={Maximization of Multi-Round Network Survivability under Considerations of the Defender’s Defensive Messaging Strategies},
        proceedings={6th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications},
        publisher={IEEE},
        proceedings_a={MOBILWARE},
        year={2014},
        month={7},
        keywords={average degree of disconnectivity average dod gradient method game theory defensive messaging strategies incomplete information survivability optimization resource allocation multi-round network recovery},
        doi={10.4108/icst.mobilware.2013.254294}
    }
    
  • Pei Yu Chen
    I Ju Shih
    Frank Yeong-Sung Lin
    Year: 2014
    Maximization of Multi-Round Network Survivability under Considerations of the Defender’s Defensive Messaging Strategies
    MOBILWARE
    IEEE
    DOI: 10.4108/icst.mobilware.2013.254294
Pei Yu Chen1,*, I Ju Shih1, Frank Yeong-Sung Lin1
  • 1: National Taiwan University
*Contact email: d96006@im.ntu.edu.tw

Abstract

nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the "gradient method" and "game theory" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.