4.7 Article

Redundancy vs. Protection vs. False Targets for Systems Under Attack

Journal

IEEE TRANSACTIONS ON RELIABILITY
Volume 58, Issue 1, Pages 58-68

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TR.2008.2011661

Keywords

Attack; damage; defense; false targets; minmax; protection; redundancy; vulnerability

Ask authors/readers for more resources

A system consists of identical elements. The cumulative performance of these elements should meet a demand. The defender applies different actions to reduce a damage associated with system performance reduction below the demand that is caused by an external attack. There are three types of the defensive actions: providing system redundancy (deploying genuine system elements (GE) with cumulative performance exceeding the demand), deploying false elements (FE), and protecting the GE. The defender tries to allocate its total defense resource optimally among the three defensive actions by choosing the total number of GE N, the number of protected GE K, and the number of FE H. The attacker cannot distinguish GE from FE. It chooses the number of elements Q to attack, and attacks Q elements at random distributing its resource evenly among the attacked elements. The model considers a non-cooperative two-period minmax game between the defender and the attacker, and presents an algorithm for determining the optimal agents' strategies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available