Loading…
Defense Strategies for Asymmetric Networked Systems with Discrete Components
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked...
Saved in:
Published in: | Sensors (Basel, Switzerland) Switzerland), 2018-05, Vol.18 (5), p.1421 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53 |
---|---|
cites | cdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53 |
container_end_page | |
container_issue | 5 |
container_start_page | 1421 |
container_title | Sensors (Basel, Switzerland) |
container_volume | 18 |
creator | Rao, Nageswara S V Ma, Chris Y T Hausken, Kjell He, Fei Yau, David K Y Zhuang, Jun |
description | We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. |
doi_str_mv | 10.3390/s18051421 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_15a63eee0cfc4aa1935bee91678c6e9e</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_15a63eee0cfc4aa1935bee91678c6e9e</doaj_id><sourcerecordid>2038271219</sourcerecordid><originalsourceid>FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</originalsourceid><addsrcrecordid>eNpdkk1vEzEQhi1ERUvgwB9AK7jAIeDvtS9IVQptpQgOhbPl9Y4Th911sB2q_HsMaaOW01j2o8czrwahVwR_YEzjj5koLAin5Ak6q4XPFaX46YPzKXqe8wZjyhhTz9Ap1a0gQqkztLwAD1OG5qYkW2AVIDc-puY878cRSgqu-QrlNqaf0Dc3-1xgzM1tKOvmImSXoECziOM2TjCV_AKdeDtkeHlXZ-jHl8_fF1fz5bfL68X5cu64lmXuO9ETKVpqucdMtN52wvVSQtc7wpkHLVQvOeuY6BTBrlNO9xpTybTQrRVshq4P3j7ajdmmMNq0N9EG8-8ippWxqQQ3gCHCSgYA2HnHrSW6OgE0ka1yEjRU16eDa7vrRuhdnSPZ4ZH08csU1mYVfxuhFeUUV8GbgyDmEkx2oYBbuzhN4IohvOWipj5D7-5-SfHXDnIxY40PhsFOEHfZVI-iLaG1vxl6-x-6ibs01TwNJVi1tFKyUu8PlEsx5wT-2DHB5u9SmONSVPb1wxGP5P0WsD8XyLGF</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2108721216</pqid></control><display><type>article</type><title>Defense Strategies for Asymmetric Networked Systems with Discrete Components</title><source>Publicly Available Content Database</source><source>PubMed Central</source><creator>Rao, Nageswara S V ; Ma, Chris Y T ; Hausken, Kjell ; He, Fei ; Yau, David K Y ; Zhuang, Jun</creator><creatorcontrib>Rao, Nageswara S V ; Ma, Chris Y T ; Hausken, Kjell ; He, Fei ; Yau, David K Y ; Zhuang, Jun ; Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><description>We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.</description><identifier>ISSN: 1424-8220</identifier><identifier>EISSN: 1424-8220</identifier><identifier>DOI: 10.3390/s18051421</identifier><identifier>PMID: 29751588</identifier><language>eng</language><publisher>Switzerland: MDPI AG</publisher><subject>aggregated correlation functions ; Correlation ; cyber-physical infrastructures ; Equilibrium conditions ; Infrastructure ; networked systems ; OTHER INSTRUMENTATION ; sum-form, product-form and composite utility functions ; Survival</subject><ispartof>Sensors (Basel, Switzerland), 2018-05, Vol.18 (5), p.1421</ispartof><rights>2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2018 by the authors. 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</citedby><cites>FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</cites><orcidid>0000-0003-4830-6570 ; 0000000348306570</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2108721216/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2108721216?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,881,25732,27903,27904,36991,36992,44569,53769,53771,74872</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/29751588$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink><backlink>$$Uhttps://www.osti.gov/servlets/purl/1474523$$D View this record in Osti.gov$$Hfree_for_read</backlink></links><search><creatorcontrib>Rao, Nageswara S V</creatorcontrib><creatorcontrib>Ma, Chris Y T</creatorcontrib><creatorcontrib>Hausken, Kjell</creatorcontrib><creatorcontrib>He, Fei</creatorcontrib><creatorcontrib>Yau, David K Y</creatorcontrib><creatorcontrib>Zhuang, Jun</creatorcontrib><creatorcontrib>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><title>Defense Strategies for Asymmetric Networked Systems with Discrete Components</title><title>Sensors (Basel, Switzerland)</title><addtitle>Sensors (Basel)</addtitle><description>We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.</description><subject>aggregated correlation functions</subject><subject>Correlation</subject><subject>cyber-physical infrastructures</subject><subject>Equilibrium conditions</subject><subject>Infrastructure</subject><subject>networked systems</subject><subject>OTHER INSTRUMENTATION</subject><subject>sum-form, product-form and composite utility functions</subject><subject>Survival</subject><issn>1424-8220</issn><issn>1424-8220</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkk1vEzEQhi1ERUvgwB9AK7jAIeDvtS9IVQptpQgOhbPl9Y4Th911sB2q_HsMaaOW01j2o8czrwahVwR_YEzjj5koLAin5Ak6q4XPFaX46YPzKXqe8wZjyhhTz9Ap1a0gQqkztLwAD1OG5qYkW2AVIDc-puY878cRSgqu-QrlNqaf0Dc3-1xgzM1tKOvmImSXoECziOM2TjCV_AKdeDtkeHlXZ-jHl8_fF1fz5bfL68X5cu64lmXuO9ETKVpqucdMtN52wvVSQtc7wpkHLVQvOeuY6BTBrlNO9xpTybTQrRVshq4P3j7ajdmmMNq0N9EG8-8ippWxqQQ3gCHCSgYA2HnHrSW6OgE0ka1yEjRU16eDa7vrRuhdnSPZ4ZH08csU1mYVfxuhFeUUV8GbgyDmEkx2oYBbuzhN4IohvOWipj5D7-5-SfHXDnIxY40PhsFOEHfZVI-iLaG1vxl6-x-6ibs01TwNJVi1tFKyUu8PlEsx5wT-2DHB5u9SmONSVPb1wxGP5P0WsD8XyLGF</recordid><startdate>20180503</startdate><enddate>20180503</enddate><creator>Rao, Nageswara S V</creator><creator>Ma, Chris Y T</creator><creator>Hausken, Kjell</creator><creator>He, Fei</creator><creator>Yau, David K Y</creator><creator>Zhuang, Jun</creator><general>MDPI AG</general><general>MDPI</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>K9.</scope><scope>M0S</scope><scope>M1P</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>7X8</scope><scope>OIOZB</scope><scope>OTOTI</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4830-6570</orcidid><orcidid>https://orcid.org/0000000348306570</orcidid></search><sort><creationdate>20180503</creationdate><title>Defense Strategies for Asymmetric Networked Systems with Discrete Components</title><author>Rao, Nageswara S V ; Ma, Chris Y T ; Hausken, Kjell ; He, Fei ; Yau, David K Y ; Zhuang, Jun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>aggregated correlation functions</topic><topic>Correlation</topic><topic>cyber-physical infrastructures</topic><topic>Equilibrium conditions</topic><topic>Infrastructure</topic><topic>networked systems</topic><topic>OTHER INSTRUMENTATION</topic><topic>sum-form, product-form and composite utility functions</topic><topic>Survival</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rao, Nageswara S V</creatorcontrib><creatorcontrib>Ma, Chris Y T</creatorcontrib><creatorcontrib>Hausken, Kjell</creatorcontrib><creatorcontrib>He, Fei</creatorcontrib><creatorcontrib>Yau, David K Y</creatorcontrib><creatorcontrib>Zhuang, Jun</creatorcontrib><creatorcontrib>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>MEDLINE - Academic</collection><collection>OSTI.GOV - Hybrid</collection><collection>OSTI.GOV</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Sensors (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rao, Nageswara S V</au><au>Ma, Chris Y T</au><au>Hausken, Kjell</au><au>He, Fei</au><au>Yau, David K Y</au><au>Zhuang, Jun</au><aucorp>Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Defense Strategies for Asymmetric Networked Systems with Discrete Components</atitle><jtitle>Sensors (Basel, Switzerland)</jtitle><addtitle>Sensors (Basel)</addtitle><date>2018-05-03</date><risdate>2018</risdate><volume>18</volume><issue>5</issue><spage>1421</spage><pages>1421-</pages><issn>1424-8220</issn><eissn>1424-8220</eissn><abstract>We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.</abstract><cop>Switzerland</cop><pub>MDPI AG</pub><pmid>29751588</pmid><doi>10.3390/s18051421</doi><orcidid>https://orcid.org/0000-0003-4830-6570</orcidid><orcidid>https://orcid.org/0000000348306570</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1424-8220 |
ispartof | Sensors (Basel, Switzerland), 2018-05, Vol.18 (5), p.1421 |
issn | 1424-8220 1424-8220 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_15a63eee0cfc4aa1935bee91678c6e9e |
source | Publicly Available Content Database; PubMed Central |
subjects | aggregated correlation functions Correlation cyber-physical infrastructures Equilibrium conditions Infrastructure networked systems OTHER INSTRUMENTATION sum-form, product-form and composite utility functions Survival |
title | Defense Strategies for Asymmetric Networked Systems with Discrete Components |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T23%3A24%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Defense%20Strategies%20for%20Asymmetric%20Networked%20Systems%20with%20Discrete%20Components&rft.jtitle=Sensors%20(Basel,%20Switzerland)&rft.au=Rao,%20Nageswara%20S%20V&rft.aucorp=Oak%20Ridge%20National%20Lab.%20(ORNL),%20Oak%20Ridge,%20TN%20(United%20States)&rft.date=2018-05-03&rft.volume=18&rft.issue=5&rft.spage=1421&rft.pages=1421-&rft.issn=1424-8220&rft.eissn=1424-8220&rft_id=info:doi/10.3390/s18051421&rft_dat=%3Cproquest_doaj_%3E2038271219%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c496t-fb5d16572a4f0357fab5cd66ebdc143fe958d643b35b810cb8c9d902639597a53%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2108721216&rft_id=info:pmid/29751588&rfr_iscdi=true |