4.7 Article

Defending a series system with individual protection, overarching protection, and disinformation

Journal

RELIABILITY ENGINEERING & SYSTEM SAFETY
Volume 204, Issue -, Pages -

Publisher

ELSEVIER SCI LTD
DOI: 10.1016/j.ress.2020.107131

Keywords

Defense and attack; False targets; Overarching protection; Game theory; Multi-state system reliability

Funding

  1. National Natural Science Foundation of China [71971176, 71601158, 71725001, U1811462]
  2. Applied Basic Research Program of Sichuan Province [2020YJ0027]

Ask authors/readers for more resources

This research addresses the use of individual protection, overarching protection, and disinformation to defend a series system against intentional attacks. The attacker can allocate resources to intelligence actions to distinguish false targets from genuine targets. Analogously, the defender can expend efforts on disinformation actions to prevent the false targets from being detected. The probability that a target is detected depends on the effort exerted by both parties. In this defense and attack model, the defender moves first and allocates its resources to overarching protection, disinformation actions, and individual protection to minimize system destruction probability, assuming that the attacker has full knowledge of its actions and will always employ the most harmful attack strategy. The attacker allocates its resources to overarching protection penetration, intelligence actions, and individual attacks to maximize system destruction probability. We formulate the defense and attack model as a two-stage minmax game and analyze the optimal defense strategy. The proposed model is illustrated by a signaling system. This study demonstrates how the defender and attacker should respond under different contest intensities and amounts of resources.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available