Skip to main content

Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks

  • Conference paper
Future Information Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 309))

  • 2124 Accesses

Abstract

How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player’s network after updating related information about another player’s. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, R.A.: Cyber War. HarperCollins (2010)

    Google Scholar 

  2. Jiang, W., Fang, B.X., Zhang, H.l., Tian, Z.H.: A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. In: International Conference on Computational Intelligence and Security (2007)

    Google Scholar 

  3. Lin, F.Y.S., Yen, H.H., Chen, P.Y., Wen, Y.F.: Evaluation of Network Survivability Considering Degree of Separation. Hybrid Artificial Intelligence Systems (2011)

    Google Scholar 

  4. Lin, F.Y.S., Chen, P.Y., Chen, Q.T.: Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD. Advances in Intelligent and Soft Computing 151, 751–758 (2012)

    Article  Google Scholar 

  5. Skaperdas, S.: Contest Success Functions. Economic Theory (1996)

    Google Scholar 

  6. Levitin, G., Hausken, K.: Shield vs. Sword Resource Distribution in K-round Duels. Central European Journal of Operations Research 8, 1–15 (2010)

    Google Scholar 

  7. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: 43rd Hawaii International Conference on System Sciences (January 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pei-Yu Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, PY., Chen, YJ., Lin, F.YS. (2014). Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_107

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55038-6_107

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55037-9

  • Online ISBN: 978-3-642-55038-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics