Resource Allocation Strategies under Considerations of Attack Preference and Multiple Deceptive Methods
Date Issued
2014
Date
2014
Author(s)
Lin, Yi-Jhen
Abstract
With the rapid growing of the Internet, information system has become an irreplaceable part of the businesses daily operation. However, although the Internet brings lots of advantages but also brings more threats to the businesses. It would create devastating financial and reputation damage to the business once the information system which is connected to the Internet is destroyed under cyber attack and caused the normal course of operations disrupted. Hence, it is important to efficiently allocate defense resource for the defender. In the defense strategy of the defender, besides traditional method to protect system, deception is another effective mechanism with the incomplete information between the defender and the attacker. Through deception, the false targets can be used to reduce the probability that the genuine targets are under attack and encounter less-attack effort to achieve the goal of protecting genuine targets from destruction. Therefore, it is an important issue to decide resources allocation strategies with the defense strategy includes false targets and additional deception under limited resources.
For this reason, we construct a model under the malicious attack with attack preference and the objective of the defender is to maximize the residual working capability while the objective of the attacker is to minimize that value. In our attack-defense scenario, the attacker can allocate part of budgets into exploring the system to obtain the evaluation of whether the target is valuable. When the value of evaluation is higher, it is more likely to be a genuine target. Therefore, the attacker can choose the targets to attack based on the evaluation and allocate proper resources to attack in the attack phase. In the view of the defender, besides deploys false targets, additional deception mechanisms can be used to interfere the evaluation of the attacker. Finally, the contest success function is adopted to evaluate the result and get the optimal solution in this problem.
Subjects
資源配置
不完全資訊
多階段
競爭成功函數
偽裝策略
攻擊優先性
工作能力
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-103-R01725045-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):22782d9809e0604ae4449df2c91976b0
