Loading…

Defense Strategies for Asymmetric Networked Systems with Discrete Components

We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Switzerland), 2018-05, Vol.18 (5), p.1421
Main Authors: Rao, Nageswara S V, Ma, Chris Y T, Hausken, Kjell, He, Fei, Yau, David K Y, Zhuang, Jun
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53
cites cdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53
container_end_page
container_issue 5
container_start_page 1421
container_title Sensors (Basel, Switzerland)
container_volume 18
creator Rao, Nageswara S V
Ma, Chris Y T
Hausken, Kjell
He, Fei
Yau, David K Y
Zhuang, Jun
description We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.
doi_str_mv 10.3390/s18051421
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_15a63eee0cfc4aa1935bee91678c6e9e</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_15a63eee0cfc4aa1935bee91678c6e9e</doaj_id><sourcerecordid>2038271219</sourcerecordid><originalsourceid>FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</originalsourceid><addsrcrecordid>eNpdkk1vEzEQhi1ERUvgwB9AK7jAIeDvtS9IVQptpQgOhbPl9Y4Th911sB2q_HsMaaOW01j2o8czrwahVwR_YEzjj5koLAin5Ak6q4XPFaX46YPzKXqe8wZjyhhTz9Ap1a0gQqkztLwAD1OG5qYkW2AVIDc-puY878cRSgqu-QrlNqaf0Dc3-1xgzM1tKOvmImSXoECziOM2TjCV_AKdeDtkeHlXZ-jHl8_fF1fz5bfL68X5cu64lmXuO9ETKVpqucdMtN52wvVSQtc7wpkHLVQvOeuY6BTBrlNO9xpTybTQrRVshq4P3j7ajdmmMNq0N9EG8-8ippWxqQQ3gCHCSgYA2HnHrSW6OgE0ka1yEjRU16eDa7vrRuhdnSPZ4ZH08csU1mYVfxuhFeUUV8GbgyDmEkx2oYBbuzhN4IohvOWipj5D7-5-SfHXDnIxY40PhsFOEHfZVI-iLaG1vxl6-x-6ibs01TwNJVi1tFKyUu8PlEsx5wT-2DHB5u9SmONSVPb1wxGP5P0WsD8XyLGF</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2108721216</pqid></control><display><type>article</type><title>Defense Strategies for Asymmetric Networked Systems with Discrete Components</title><source>Publicly Available Content Database</source><source>PubMed Central</source><creator>Rao, Nageswara S V ; Ma, Chris Y T ; Hausken, Kjell ; He, Fei ; Yau, David K Y ; Zhuang, Jun</creator><creatorcontrib>Rao, Nageswara S V ; Ma, Chris Y T ; Hausken, Kjell ; He, Fei ; Yau, David K Y ; Zhuang, Jun ; Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><description>We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.</description><identifier>ISSN: 1424-8220</identifier><identifier>EISSN: 1424-8220</identifier><identifier>DOI: 10.3390/s18051421</identifier><identifier>PMID: 29751588</identifier><language>eng</language><publisher>Switzerland: MDPI AG</publisher><subject>aggregated correlation functions ; Correlation ; cyber-physical infrastructures ; Equilibrium conditions ; Infrastructure ; networked systems ; OTHER INSTRUMENTATION ; sum-form, product-form and composite utility functions ; Survival</subject><ispartof>Sensors (Basel, Switzerland), 2018-05, Vol.18 (5), p.1421</ispartof><rights>2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2018 by the authors. 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</citedby><cites>FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</cites><orcidid>0000-0003-4830-6570 ; 0000000348306570</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2108721216/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2108721216?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,881,25732,27903,27904,36991,36992,44569,53769,53771,74872</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/29751588$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink><backlink>$$Uhttps://www.osti.gov/servlets/purl/1474523$$D View this record in Osti.gov$$Hfree_for_read</backlink></links><search><creatorcontrib>Rao, Nageswara S V</creatorcontrib><creatorcontrib>Ma, Chris Y T</creatorcontrib><creatorcontrib>Hausken, Kjell</creatorcontrib><creatorcontrib>He, Fei</creatorcontrib><creatorcontrib>Yau, David K Y</creatorcontrib><creatorcontrib>Zhuang, Jun</creatorcontrib><creatorcontrib>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><title>Defense Strategies for Asymmetric Networked Systems with Discrete Components</title><title>Sensors (Basel, Switzerland)</title><addtitle>Sensors (Basel)</addtitle><description>We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.</description><subject>aggregated correlation functions</subject><subject>Correlation</subject><subject>cyber-physical infrastructures</subject><subject>Equilibrium conditions</subject><subject>Infrastructure</subject><subject>networked systems</subject><subject>OTHER INSTRUMENTATION</subject><subject>sum-form, product-form and composite utility functions</subject><subject>Survival</subject><issn>1424-8220</issn><issn>1424-8220</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkk1vEzEQhi1ERUvgwB9AK7jAIeDvtS9IVQptpQgOhbPl9Y4Th911sB2q_HsMaaOW01j2o8czrwahVwR_YEzjj5koLAin5Ak6q4XPFaX46YPzKXqe8wZjyhhTz9Ap1a0gQqkztLwAD1OG5qYkW2AVIDc-puY878cRSgqu-QrlNqaf0Dc3-1xgzM1tKOvmImSXoECziOM2TjCV_AKdeDtkeHlXZ-jHl8_fF1fz5bfL68X5cu64lmXuO9ETKVpqucdMtN52wvVSQtc7wpkHLVQvOeuY6BTBrlNO9xpTybTQrRVshq4P3j7ajdmmMNq0N9EG8-8ippWxqQQ3gCHCSgYA2HnHrSW6OgE0ka1yEjRU16eDa7vrRuhdnSPZ4ZH08csU1mYVfxuhFeUUV8GbgyDmEkx2oYBbuzhN4IohvOWipj5D7-5-SfHXDnIxY40PhsFOEHfZVI-iLaG1vxl6-x-6ibs01TwNJVi1tFKyUu8PlEsx5wT-2DHB5u9SmONSVPb1wxGP5P0WsD8XyLGF</recordid><startdate>20180503</startdate><enddate>20180503</enddate><creator>Rao, Nageswara S V</creator><creator>Ma, Chris Y T</creator><creator>Hausken, Kjell</creator><creator>He, Fei</creator><creator>Yau, David K Y</creator><creator>Zhuang, Jun</creator><general>MDPI AG</general><general>MDPI</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>K9.</scope><scope>M0S</scope><scope>M1P</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>7X8</scope><scope>OIOZB</scope><scope>OTOTI</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4830-6570</orcidid><orcidid>https://orcid.org/0000000348306570</orcidid></search><sort><creationdate>20180503</creationdate><title>Defense Strategies for Asymmetric Networked Systems with Discrete Components</title><author>Rao, Nageswara S V ; Ma, Chris Y T ; Hausken, Kjell ; He, Fei ; Yau, David K Y ; Zhuang, Jun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>aggregated correlation functions</topic><topic>Correlation</topic><topic>cyber-physical infrastructures</topic><topic>Equilibrium conditions</topic><topic>Infrastructure</topic><topic>networked systems</topic><topic>OTHER INSTRUMENTATION</topic><topic>sum-form, product-form and composite utility functions</topic><topic>Survival</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rao, Nageswara S V</creatorcontrib><creatorcontrib>Ma, Chris Y T</creatorcontrib><creatorcontrib>Hausken, Kjell</creatorcontrib><creatorcontrib>He, Fei</creatorcontrib><creatorcontrib>Yau, David K Y</creatorcontrib><creatorcontrib>Zhuang, Jun</creatorcontrib><creatorcontrib>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>MEDLINE - Academic</collection><collection>OSTI.GOV - Hybrid</collection><collection>OSTI.GOV</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Sensors (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rao, Nageswara S V</au><au>Ma, Chris Y T</au><au>Hausken, Kjell</au><au>He, Fei</au><au>Yau, David K Y</au><au>Zhuang, Jun</au><aucorp>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Defense Strategies for Asymmetric Networked Systems with Discrete Components</atitle><jtitle>Sensors (Basel, Switzerland)</jtitle><addtitle>Sensors (Basel)</addtitle><date>2018-05-03</date><risdate>2018</risdate><volume>18</volume><issue>5</issue><spage>1421</spage><pages>1421-</pages><issn>1424-8220</issn><eissn>1424-8220</eissn><abstract>We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.</abstract><cop>Switzerland</cop><pub>MDPI AG</pub><pmid>29751588</pmid><doi>10.3390/s18051421</doi><orcidid>https://orcid.org/0000-0003-4830-6570</orcidid><orcidid>https://orcid.org/0000000348306570</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1424-8220
ispartof Sensors (Basel, Switzerland), 2018-05, Vol.18 (5), p.1421
issn 1424-8220
1424-8220
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_15a63eee0cfc4aa1935bee91678c6e9e
source Publicly Available Content Database; PubMed Central
subjects aggregated correlation functions
Correlation
cyber-physical infrastructures
Equilibrium conditions
Infrastructure
networked systems
OTHER INSTRUMENTATION
sum-form, product-form and composite utility functions
Survival
title Defense Strategies for Asymmetric Networked Systems with Discrete Components
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T23%3A24%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Defense%20Strategies%20for%20Asymmetric%20Networked%20Systems%20with%20Discrete%20Components&rft.jtitle=Sensors%20(Basel,%20Switzerland)&rft.au=Rao,%20Nageswara%20S%20V&rft.aucorp=Oak%20Ridge%20National%20Lab.%20(ORNL),%20Oak%20Ridge,%20TN%20(United%20States)&rft.date=2018-05-03&rft.volume=18&rft.issue=5&rft.spage=1421&rft.pages=1421-&rft.issn=1424-8220&rft.eissn=1424-8220&rft_id=info:doi/10.3390/s18051421&rft_dat=%3Cproquest_doaj_%3E2038271219%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2108721216&rft_id=info:pmid/29751588&rfr_iscdi=true