1 / 50

Parallel systems under two sequential attacks Gregory Levitin , Kjell Hausken

Parallel systems under two sequential attacks Gregory Levitin , Kjell Hausken. Advisor: Frank,Yeong -Sung Lin 碩一 冠廷. Agenda. 1.Introduction 2.The attack model 2.1. Even resource distribution between two attacks

chung
Download Presentation

Parallel systems under two sequential attacks Gregory Levitin , Kjell Hausken

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Parallel systems under two sequential attacks Gregory Levitin, KjellHausken Advisor: Frank,Yeong-Sung Lin 碩一 冠廷

  2. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  3. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  4. Introduction • An attacker tries to maximize the system vulnerability. • The attacker distributes its constrained resource optimally across two attacks. • The attacker can choose the number of elements to be attacked in the first attack. • The attacker observes which elements are destroyed and not destroyed in the first attack, and applies its remaining resource into attacking the remaining elements in the second attack.

  5. Introduction • We consider a 1-out-of-N system which means that all elements have to be destroyed to ensure a non-functioning system. • The defender distributes its constrained resource between deploying redundant elements and protecting them against the attack.

  6. Introduction

  7. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  8. The attack model • The vulnerability of an element that is attacked is determined by a contest between the defender and the attacker. • Contest success function:

  9. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  10. 2.1 Even resource distribution between two attacks • Two identical separated parallel elements. (N=2) • The total attacker’s resource equals the total defender’s resource: r=R. • The defender allocates the same resource r/2 to protection of each element. • If the attacker attacks several elements, it distributes its resource evenly among the elements

  11. 2.1 Even resource distribution between two attacks • First scenario:the attacker uses all its resources in the single attack. 1.The element vulnerability is 2.The probability that both elements are destroyed is v2=0.25.

  12. First scenario Defender Attacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 R T=R/2 T=R/2 t=r/2

  13. 2.1 Even resource distribution between two attacks • Second scenario:the attacker distributes its resources evenly between two attacks. 1.The element vulnerability is 2. Three possible outcomes of attack A. Two elements are destroyed of first attack with probability w2.

  14. Second scenario(A) Defender Attacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/4 R/2 T=R/4 R/2 t=r/2

  15. 2.1 Even resource distribution between two attacks 2. Three possible outcomes of attack B. One element is destroyed of first attack with probability 2(1-w)w. One element is destroyed of second attack with probability v.(Attacker attacks the remaining single element with all its remaining resource R/2) Both attack with probability 2(1-w)w‧v=(1-w)w

  16. Second scenario(B) Defender Attacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/4 R/2 T=R/4 R/2 t=r/2 T=R/2

  17. 2.1 Even resource distribution between two attacks 2. Three possible outcomes of attack C. Two elements are not destroyed of first attack with probability (1-w)2. Two elements are destroyed of second attack with probability w2. Both attack with probability (1-w)2w2.

  18. Second scenario(C) Defender Attacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=R/4 R/2 T=R/4 T=R/4 R/2 t=r/2 T=R/4

  19. 2.1 Even resource distribution between two attacks • Since three possible outcomes of attack are mutually exclusive scenarios, the overall probability of system destruction in a double attack is • The double attack with even resource distribution is beneficial if the system vulnerability in double attack exceeds this probability in single attack:

  20. 2.1 Even resource distribution between two attacks • It can be seen that the double attack with even resource distribution is beneficial for m<=1.82. r/R=1 m=1.82

  21. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  22. 2.2 Uneven resource distribution between two attacks • The attacker allocates a part xR of its resource in the first attack, and the remaining part (1-x)R in the second attack. (0< x <=1) • The element vulnerability in the first attack is • If one element is destroyed in the first attack, the remaining attacker’s resource per element is (1-x)R.

  23. Scenario Defender Attacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=xR/2 xR T=xR/2 (1-x)R t=r/2

  24. 2.2 Uneven resource distribution between two attacks • If both elements survive the first attack ,the remaining attacker’s resource per element is(1-x)R/2. • The overall system vulnerability

  25. 2.2 Uneven resource distribution between two attacks m較小時,平均分配資源至兩次攻擊 r=R m較大時,集中資源至某一次攻擊 m 小 m 大

  26. 2.2 Uneven resource distribution between two attacks for r/R=0.5, m*= 3.06; for r/R=1, m* =1.87;and for r/R=2, m*=1.6 When m>m* the double attack cannot provide greater system vulnerability than single attack for any attacker’s resource distribution x. (ex. r/R=1)

  27. 2.2 Uneven resource distribution between two attacks Single attack Double attack presents m* (the maximal value of m when double attack remains beneficial)as a function of r/R.

  28. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  29. 2.3 Uneven resource distribution between two attacks and between elements • The attacker attacks only one out of two elements. • The first attack allocating the resource xR to one element. • The element vulnerability in the first attack is

  30. Scenario Defender Attacker N =2 Entire defender’s resource=r Entire attacker’s resource=R t=r/2 T=xR xR T=(1-X)R (1-x)R t=r/2

  31. 2.3 Uneven resource distribution between two attacks and between elements • The overall system vulnerability is ref:

  32. 2.3 Uneven resource distribution between two attacks and between elements r/R=1 m小,攻擊者會頃向選擇所有elements elements m大,攻擊者會頃向選擇部分elements

  33. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  34. General model of the optimal attack • The attacker chooses x and the number Q of elements to attack in the first attack optimally. • The attacker can distribute its resource unevenly across the two attacks, and evenly across those elements it chooses to attack in each of the two attacks. • The element vulnerability in the first attack is

  35. General model of the optimal attack • The probability that exactly j (0<=j<=Q) elements are destroyed by the first attack is • The probability of system destruction is

  36. General model of the optimal attack • The attacker seeks for x and Q that maximize V(x,Q).

  37. General model of the optimal attack N=4 1. If m is high, the attacker prefers to attack the partial elements. If m is low, the attacker prefers to attack all elements. 2. A highly intensive contest and constant N the choice of x plays no important role.

  38. General model of the optimal attack r/R=1 1. If m is high, the attacker prefers to attack the partial elements. If m is low, the attacker prefers to attack all elements. 2. The attacker’s effort decreases as N increases , but decreasing x* when Q* is constant means that the attacker increases its per element effort in the second attack

  39. Proposition • if the attacker can choose 1. how many elements to attack in the first attack, 0<=Q<=N, 2. how to distribute its effort between the two attacks, 0<x<=1 then a single attack is never preferable

  40. Proof • Concentrating all its resource on a single attack • Hypothetically, it achieves the same per element effort xR/Q=R/N in the first attack (x=Q/N)

  41. Proof • which is always greater than V=v(R/N,r/N)N achieved in the single attack. j=Q 時

  42. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  43. Defender’s minmax strategy • The defender choose the number of elements N and distribute its resource r between deploying N elements and protecting these N elements. • Observe that 1<=N<=└r/y┘, where └r/y┘ is the greatest integer that does not exceed r/y. • The resource remaining for protection is r-Ny

  44. Defender’s minmax strategy • The optimal values x*, Q*, and N* are determined by the following enumerative minmax procedure.

  45. Defender’s minmax strategy y/R=0.2

  46. Defender’s minmax strategy r/R=2

  47. Agenda • 1.Introduction • 2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource distribution between two attacks 2.3. Uneven resource distribution between two attacks and between elements • 3.General model of the optimal attack • 4.Defender’s minmax strategy • 5.Conclusions

  48. Conclusions • The attacker can decide whether to concentrate its limited resource on a single attack or distribute it among two attacks. • The defender distributes its limited resource among deploying redundant elements and protecting them against attacks. • The defender chooses the strategy that minimizes the maximal system vulnerability that the attacker can achieve using its optimal strategy.

  49. Conclusions • The presented model uses the contest intensity parameter m that cannot be exactly evaluated in practice. • Two ways of handling the uncertainty of the contest intensity can be outlined: A. m can be defined as a fuzzy variable and fuzzy logic model can be studied. B. the range of possible variation of m takes the values that are most favorable for the attacker.

  50. Thanks for your listening. 

More Related