Optimal Resource Allocation for Protecting System Availability against Random Cyber Attacks
Distributed systems usually provide services with varying criticalities. Failures of core services lead to catastrophic consequences to the system. Maintaining system core services availability with limited resources has become a challenging issue, especially when system operates in an adversary environment and face malicious under attack. This paper discusses the attacker-defender problem and analyzes how to allocate resources to maximize system availability, especially the core services availability. In our model, the defender seeks to maintain maximum system availability for a given period of time, and does so by distributing defensive resources to component protection enhancement, creation of redundant components, and camouflaged components deployment. We assume that the attacker has no knowledge about the system configuration, and hence randomly attacks different nodes in the system. We formulate this attacker-defender problem as a defenders optimization problem and present an algorithm that optimally allocates system resource to achieve maximum system availability.
Defense Strategy Attacker-defender Problem Resource Allocation
Li Wang Shangping Ren Ke Yue Kevin Kwiat
Department of Computer Science Illinois Institute of Technology Chicago, Illinois, United States Cyber Science Branch Air Force Research Laboratory, AFRL/RIGG Rome, NY, United States
国际会议
上海
英文
477-482
2011-03-11(万方平台首次上网日期,不代表论文的发表时间)