会议专题

Optimal Resource Allocation for Protecting System Availability against Random Cyber Attacks

Distributed systems usually provide services with varying criticalities. Failures of core services lead to catastrophic consequences to the system. Maintaining system core services availability with limited resources has become a challenging issue, especially when system operates in an adversary environment and face malicious under attack. This paper discusses the attacker-defender problem and analyzes how to allocate resources to maximize system availability, especially the core services availability. In our model, the defender seeks to maintain maximum system availability for a given period of time, and does so by distributing defensive resources to component protection enhancement, creation of redundant components, and camouflaged components deployment. We assume that the attacker has no knowledge about the system configuration, and hence randomly attacks different nodes in the system. We formulate this attacker-defender problem as a defenders optimization problem and present an algorithm that optimally allocates system resource to achieve maximum system availability.

Defense Strategy Attacker-defender Problem Resource Allocation

Li Wang Shangping Ren Ke Yue Kevin Kwiat

Department of Computer Science Illinois Institute of Technology Chicago, Illinois, United States Cyber Science Branch Air Force Research Laboratory, AFRL/RIGG Rome, NY, United States

国际会议

2011 3rd IEEE International Conference on Computer Research and Development(ICCRD 2011)(2011第三届计算机研究与发展国际会议)

上海

英文

477-482

2011-03-11(万方平台首次上网日期,不代表论文的发表时间)