Journal
RELIABILITY ENGINEERING & SYSTEM SAFETY
Volume 94, Issue 12, Pages 1927-1941Publisher
ELSEVIER SCI LTD
DOI: 10.1016/j.ress.2009.06.010
Keywords
Attack; Defense; System demand; Elements; Protection; False targets; Redundancy; Damage; Survivability; Optimization; Intelligence
Ask authors/readers for more resources
The paper considers a system consisting of identical elements that can be intentionally attacked. The cumulative performance of the system elements Should meet a demand. To prevent loss of demand the defender provides system redundancy (deploying genuine system elements (GEs) with cumulative performance exceeding the demand); deploys false elements (FEs), and protects the M. If the attacker cannot distinguish GEs and FEs, he chooses the number of elements to attack and attacks at random these elements distributing his resource evenly among the attacked elements. In order to get the information about the system the attacker allocates a part of his resource into the intelligence activity. Analogously, the defender allocates a part of his resource into the counter-intelligence activity. The attacker's strategy presumes distribution of his resource among the intelligence and attack effort and choice of the number of attacked elements. If the attacker wins the intelligence contest, he can identify both FEs and unprotected GEs ignoring the former ones and destroying the latter ones with negligible effort. The defender's strategy presumes distribution of his resource among the counter-intelligence and the three defensive actions. The paper considers a three-period non-cooperative minmax game between the defender and the attacker and presents an algorithm for determining the agents' optimal strategies. (C) 2009 Elsevier Ltd. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available