parallel systems under two sequential attacks gregory levitin , kjell hausken

Post on 15-Feb-2016

46 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Parallel systems under two sequential attacks Gregory Levitin , Kjell Hausken. Advisor: Frank,Yeong -Sung Lin 碩一 冠廷. Agenda. 1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks - PowerPoint PPT Presentation

TRANSCRIPT

1

Parallel systems under two sequential attacks

Gregory Levitin, Kjell Hausken

Advisor: Frank,Yeong-Sung Lin碩一 冠廷

2

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

3

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

4

An attacker tries to maximize the system vulnerability.

The attacker distributes its constrained resource optimally across two attacks.

The attacker can choose the number of elements to be attacked in the first attack.

The attacker observes which elements are destroyed and not destroyed in the first attack, and applies its remaining resource into attacking the remaining elements in the second attack.

Introduction

5

We consider a 1-out-of-N system which means that all elements have to be destroyed to ensure a non-functioning system.

The defender distributes its constrained resource between deploying redundant elements and protecting them against the attack.

Introduction

6

Introduction

7

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

8

The vulnerability of an element that is attacked is determined by a contest between the defender and the attacker.

Contest success function :

The attack model

9

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

10

Two identical separated parallel elements. (N=2) The total attacker’s resource equals the total defender’s resource: r=R. The defender allocates the same resource r/2 to protection of each element. If the attacker attacks several elements, it distributes its resource evenly among the elements

2.1 Even resource distribution between two attacks

11

First scenario: the attacker uses all its resources in the single attack.

1.The element vulnerability is

2.The probability that both elements are destroyed is v2=0.25.

2.1 Even resource distribution between two attacks

12

First scenario

R

Defender AttackerN =2

Entire defender’s resource=r Entire attacker’s resource=R

t=r/2

t=r/2

T=R/2

T=R/2

13

Second scenario: the attacker distributes its resources evenly between two attacks.

1.The element vulnerability is 2. Three possible outcomes of attack A. Two elements are destroyed of first attack with probability w2.

2.1 Even resource distribution between two attacks

14

Second scenario(A)Defender Attacke

rN =2Entire defender’s resource=r Entire attacker’s resource=R

t=r/2

t=r/2

T=R/4

T=R/4

R/2

R/2

15

2. Three possible outcomes of attack B. One element is destroyed of first attack with probability 2(1-w)w. One element is destroyed of second attack with probability v.(Attacker attacks the remaining single element with all its remaining resource R/2) Both attack with probability 2(1-w)w‧v=(1-w)w

2.1 Even resource distribution between two attacks

16

Second scenario(B)Defender Attacke

rN =2Entire defender’s resource=r Entire attacker’s resource=R

t=r/2

t=r/2

T=R/4

T=R/4

R/2

R/2T=R/2

17

2. Three possible outcomes of attack C. Two elements are not destroyed of first attack with probability (1-w)2.

Two elements are destroyed of second attack with probability w2. Both attack with probability (1-w)2w2.

2.1 Even resource distribution between two attacks

18

Second scenario(C)Defender Attacke

rN =2Entire defender’s resource=r Entire attacker’s resource=R

t=r/2

t=r/2

T=R/4

T=R/4

R/2

R/2T=R/4

T=R/4

19

Since three possible outcomes of attack are mutually exclusive scenarios, the overall probability of system destruction in a double attack is

The double attack with even resource distribution is beneficial if the system vulnerability in double attack exceeds this probability in single attack:

2.1 Even resource distribution between two attacks

20

2.1 Even resource distribution between two attacks It can be seen that the double attack with

even resource distribution is beneficial for m<=1.82.

m=1.82

r/R=1

21

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

22

The attacker allocates a part xR of its resource in the first attack, and the remaining part (1-x)R in the second attack. (0< x <=1)

The element vulnerability in the first attack is

If one element is destroyed in the first attack, the remaining attacker’s resource per element is (1-x)R.

2.2 Uneven resource distribution between two attacks

23

ScenarioDefender Attacke

rEntire attacker’s resource=R

t=r/2

t=r/2

T=xR/2

T=xR/2

xR

(1-x)R

N =2Entire defender’s resource=r

24

If both elements survive the first attack ,the remaining attacker’s resource per element is(1-x)R/2.

The overall system vulnerability

2.2 Uneven resource distribution between two attacks

25

2.2 Uneven resource distribution between two attacks m 較小時,平均分配資源至兩次攻擊

m 較大時,集中資源至某一次攻擊m 小

m 大

r=R

26

2.2 Uneven resource distribution between two attacks

for r/R=0.5, m*= 3.06; for r/R=1, m* =1.87;and for r/R=2, m*=1.6

When m>m* the double attackcannot provide greater systemvulnerability than single attackfor any attacker’s resource distribution x. (ex. r/R=1)

27

2.2 Uneven resource distribution between two attacks

presents m* (the maximal value of m when double attack remains beneficial)as a function of r/R.

Double attack

Single attack

28

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

29

The attacker attacks only one out of two elements.

The first attack allocating the resource xR to one element.

The element vulnerability in the first attack is

2.3 Uneven resource distribution between two attacks and between elements

30

ScenarioDefender Attacke

rEntire attacker’s resource=R

t=r/2

t=r/2

T=xR

T=(1-X)R

xR

(1-x)R

N =2Entire defender’s resource=r

31

2.3 Uneven resource distribution between two attacks and between elements

The overall system vulnerability is

ref:

32

2.3 Uneven resource distribution between two attacks and between elements

m 小,攻擊者會頃向選擇所有 elements

elements m 大,攻擊者會頃向選擇部分 elements

r/R=1

33

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

34

The attacker chooses x and the number Q of elements to attack in the first attack optimally.

The attacker can distribute its resource unevenly across the two attacks, and evenly across those elements it chooses to attack in each of the two attacks.

The element vulnerability in the first attack is

General model of the optimal attack

35

The probability that exactly j (0<=j<=Q) elements are destroyed by the first attack is

The probability of system destruction is

General model of the optimal attack

36

The attacker seeks for x and Q that maximize V(x,Q).

General model of the optimal attack

37

General model of the optimal attack

1. If m is high, the attacker prefers to attack the partial elements. If m is low, the attacker prefers to attack all elements.2. A highly intensive contest and constant N the choice of x plays no important role.

N=4

38

General model of the optimal attack

1. If m is high, the attacker prefers to attack the partial elements. If m is low, the attacker prefers to attack all elements.2. The attacker’s effort decreases as N increases , but decreasing x* when Q* is constant means that the attacker increases its per element effort in the second attack

r/R=1

39

if the attacker can choose 1. how many elements to attack in the first attack, 0<=Q<=N, 2. how to distribute its effort between the two attacks, 0<x<=1 then a single attack is never preferable

Proposition

40

Concentrating all its resource on a single attack

Hypothetically, it achieves the same per element effort xR/Q=R/N in the first attack (x=Q/N)

Proof

41

which is always greater than V=v(R/N,r/N)N achieved in the single attack.

Proof

j=Q 時

42

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

43

The defender choose the number of elements N and distribute its resource r between deploying N elements and protecting these N elements.

Observe that 1<=N<=└r/y

┘, where

└r/y

┘ is

the greatest integer that does not exceed r/y.

The resource remaining for protection is r-Ny

Defender’s minmax strategy

44

The optimal values x*, Q*, and N* are determined by the following enumerative minmax procedure.

Defender’s minmax strategy

45

Defender’s minmax strategy

y/R=0.2

46

Defender’s minmax strategy

r/R=2

47

1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements 3.General model of the optimal attack 4.Defender’s minmax strategy 5.Conclusions

Agenda

48

The attacker can decide whether to concentrate its limited resource on a single attack or distribute it among two attacks.

The defender distributes its limited resource among deploying redundant elements and protecting them against attacks.

The defender chooses the strategy that minimizes the maximal system vulnerability that the attacker can achieve using its optimal strategy.

Conclusions

49

The presented model uses the contest intensity parameter m that cannot be exactly evaluated in practice.

Two ways of handling the uncertainty of the contest intensity can be outlined :

A. m can be defined as a fuzzy variable and fuzzy logic model can be studied. B. the range of possible variation of m takes the values that are most favorable for the attacker.

Conclusions

50

Thanks for your listening.

top related