Research Article
Maximization of Multi-Round Network Survivability under Considerations of the Defender’s Defensive Messaging Strategies
@INPROCEEDINGS{10.4108/icst.mobilware.2013.254294, author={Pei Yu Chen and I Ju Shih and Frank Yeong-Sung Lin}, title={Maximization of Multi-Round Network Survivability under Considerations of the Defender’s Defensive Messaging Strategies}, proceedings={6th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications}, publisher={IEEE}, proceedings_a={MOBILWARE}, year={2014}, month={7}, keywords={average degree of disconnectivity average dod gradient method game theory defensive messaging strategies incomplete information survivability optimization resource allocation multi-round network recovery}, doi={10.4108/icst.mobilware.2013.254294} }
- Pei Yu Chen
I Ju Shih
Frank Yeong-Sung Lin
Year: 2014
Maximization of Multi-Round Network Survivability under Considerations of the Defender’s Defensive Messaging Strategies
MOBILWARE
IEEE
DOI: 10.4108/icst.mobilware.2013.254294
Abstract
nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the "gradient method" and "game theory" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.