adviser: frank, yeong - sung lin present by jason chang 1

77
IMPROVING SYSTEM RELIABILITY AGAINST RATIONAL ATTACK UNDER GIVEN RESOURCES SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, IEEE TRANSACTIONS ON (VOLUME:44 , ISSUE: 4 ) LI WANG Adviser: Frank , Yeong - Sung Lin Present by Jason Chang 1

Upload: jocelyn-white

Post on 05-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

1

IMPROVING SYSTEM RELIABILITY AGAINST RATIONAL ATTACK UNDER GIVEN RESOURCESSYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, IEEE TRANSACTIONS ON (VOLUME:44 , ISSUE: 4 )

LI WANG

Adviser: Frank , Yeong - Sung Lin

Present by Jason Chang

Page 2: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

2

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 3: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

3

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 4: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

4

INTRODUCTIONReliability represents a system’s ability to work correctly and continuously.

Unfortunately, the reliability of individual components of a given system is rarely one.

To improve system reliability in the presence of possible component failures:RedundancyVoting schemes

Page 5: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

5

INTRODUCTIONWhen the reliability of a single component(replica) is high, the more redundancies that are added to the system, the more reliable the system behaves.

However, when the system is under intentional cyber attacks, voting components may be compromised by the attacks.

In fact, when both the reliability of components and possibility of components being compromised are taken into consideration…

Page 6: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

6

Example 1 : Assume a system consist of 9 replicas. The reliability of each replica is 0.9 If only five out of the nine replicas are used in deciding the final result through a

majority voting, the system reliability is

where Nv is the number of voting components and p is the component’s reliability.

INTRODUCTION

Page 7: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

7

INTRODUCTION

Page 8: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

8

INTRODUCTIONHowever, if the system is under attack, it is no longer the case that more voters the systems has, the more reliable the system is.

As an example, assume five out of the nine components are compromised, if we still choose all nine components to vote, the reliability of the system is 0 because the majority of the voters are compromised.

However ,if we choose a single component as a voting component, the reliability of the system is × 0.90 = 0.40, which is better than the case where all nine components are used.

Page 9: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

9

INTRODUCTIONIn order to reduce the probability of a system being compromised, we have to increase the difficulty for an attacker to launch successful attacks if such attacks cannot be fully prevented.To enhance the cyber protection of existing system components.

To decrease the probability that an attacker would strike the system’s voting components.

Page 10: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

10

INTRODUCTIONTo decrease the probability that an attacker would strike the system’s voting components: Information hiding technique.Defender can dynamically select different sets of voting components.

In this paper, we assume attackers cannot distinguish the differences among components, hence adding camouflaging components, such as installing honeypots [7], decreases the probability of a voting component being attacked.

Page 11: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

11

Based on [8]–[11], it is known that between a defender and an attacker, the one who invests more resources on a component wins that component .We revisit Example 1.

Example 2 (Example 1 Revisited) : Assume:

9 components reliability = 0.9 attacker & defender resource = 18 units Creating a camouflaging component = 2 units the attack is random, but the attacker can make rational decisions in

selecting the number of components to attack.

INTRODUCTION

Page 12: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

12

INTRODUCTIONCase 1 :

Assume the attacker chooses six components to attack and evenly distributes his/her resources on the selected components; while the defender allocates his/her resources to protect all nine components that all participate in the voting process.

the defender allocates 18/9 = 2 units of resources the attacker allocates 18/6 = 3 units of resources all six components being attacked are compromisedThe majority voting from the nine components results in 0 reliability.

Page 13: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

13

INTRODUCTIONCase 2 :

Suppose the attacker’s strategy remains the same, but the defender changes his/her strategy to create 3 camouflaging components, and the remaining resources are allocated to protect three components that are chosen as voters.

the defender allocates (18-2*3)/3 = 4 units of resources the attacker allocates 18/6 = 3 units of resources all three being attacked are survived

As these protected components are the only voting components, according to (1), the system reliability is 0.9720.

Page 14: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

14

INTRODUCTIONCase 3 :

If the defender keeps the winning strategy, but the attacker changes his/her strategy to attack only 4 components, the system reliability reduces to 0.6598.

From this example, we can see that the best strategy for the defender depends on how the attacker allocates his/her resources; similarly, the best strategy for the attacker also depends on how the defender allocates his/her resources and how many components are chosen to vote.

Page 15: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

15

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 16: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

16

RELATED WORKBier et. al. showed that the optimal resource allocation for defender not only depends on the structure of the system and the cost-effectiveness of component protection investments, but also on the adversary’s goals and constraints.([12],[13])

Yalaoui et al. have considered redundant components in series systems and proposed a dynamic programming method to calculate the minimum cost required for a system to satisfy the minimum reliability requirement.([14])

Page 17: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

17

RELATED WORKLevitin and Hausken consider series and parallel systems, series systems of parallel subsystems, and parallel systems of series subsystems, and analyze system reliability when system have or do not have budget constraint.([15]-[18])

They further analyze how to allocate resource between deploying camouflaging components and enhancing component protection when only one component needs to be protected against attacks.([8])

Page 18: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

18

RELATED WORKThey provide approaches of protection and redundancy to reduce the expected damages caused by attacks. The of each system element is determined by an attacker-defender contest success function, and the expected damage caused by the attack is evaluated as the system’s unsupplied demand.([10])

They proposed three approaches to minimize system damage when both the defender and attacker choose their strategies when the contest intensity changes.([9])

Page 19: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

19

RELATED WORKDifference I :

The reliability of the system does not depend on the system‘s structure nor on the number of uncompromised system components, but instead it is decided by a nonempty subset of the components in a system that from the voting components.

Page 20: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

20

RELATED WORKHardekopf et al. proposed a decentralized voting algorithm that improves system dependability and protects the system from faults and hostile attacks. ([19])

Tong et al. showed how to choose optimal weight assignments for the majority voting strategy in the system and also proposed new effective vote assignment algorithms that aim to maximize the system reliability. ([20])

Davcev proposed a dynamic weighted voting scheme for consistency and recovery control of replicated files in distributed systems. ([21] )

Page 21: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

21

RELATED WORKDifference I :

A voting scheme as outlined in [3] is employed, however, different from [3], we extend Random Troika to encompass, if needed, up to n components to form the voters.

Difference II :[19]-[21] considers the performance of the algorithm when

the number of system component is fixed; while in this paper, the number of composing components can be changed under

different resource allocation strategies, which may lead to a change in the voting strategy to achieve a higher reliability.

Page 22: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

22

RELATED WORKOur earlier work focused on :

Using an information hiding approach to prevent the attackers from quickly identifying the location of critical components in the system. ([6])

Deciding optimal resource allocation for improving system reliability under random attack( [27], [28])

Determining a voting strategy for a set of clusters when they are under rational attacks .([29])

Page 23: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

23

RELATED WORKDifference I : The system models are different.The system reliability depends on the reliability of a set of selected voting components and whether they are compromised or not, while in [27] and [28], the system reliability is the probability that all critical components survive the attacks, and [29] aims to maximize the overall reliability of a set of clusters rather than an individual system.

Difference II : The protection approaches are different.The previous work either considers the voting mechanism or protection approaches (i.e., creating camouflaging components, or enhancing component protection, etc.), while the work presented in this paper considers a more comprehensive approach that integrates the voting mechanism with the protection approaches.

Page 24: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

24

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 25: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

25

ASSUMPTIONS AND PROBLEM DEFINITION

The notations used in this paper :Notation Implication

Ns Number of system components

Nc Number of camouflaging components

Np Number of protected components

Nv Number of voting components

Na Number of attacked components

Number of attacked voting components

Number of compromised voting components

Number of attacked protected voting components

Rd Total defense resources

Ra Total attack resources

vaNfvNpvaN

Page 26: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

26

ASSUMPTIONS AND PROBLEM DEFINITION

The notations used in this paper (cont.):Notation Implication

rd Amount of defense resources on each protected component

ra Amount of attack resources on each attacked component

C Cost for creating a camouflaging component

p Component’s reliability

P System reliability

M Reliability matrix

Defense strategy selection vector

Attack strategy selection vector

Sd Number of defense strategies

Sa Number of attack strategies

XSSSSSSSSSSSSSS

YSSSSSSSSSSSSSS

Page 27: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

27

ASSUMPTIONS AND PROBLEM DEFINITION

Assumptions:A system consists of Ns diverse replicas, and the reliability of each replicated component is p.

We use Nv to denote the number of voting components, where Nv ≤ Ns .

The system reliability P is defined as the probability that a correct result is obtained through a majority voting among voters.

Page 28: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

28

ASSUMPTIONS AND PROBLEM DEFINITION

Page 29: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

29

ASSUMPTIONS AND PROBLEM DEFINITION

Assume a system defender is given a fixed amount of defense resource, Rd , which can be used to create camouflaging components or to enhance component cyber protection, and the cost for creating a camouflaging component is C, and Nc camouflaging components are created, where Nc × C ≤ Rd .

The remaining defense resources (Rd – Nc × C) are evenly distributed to enhance the cyber protection of a subset of system components, called protected components Np, 0 ≤ Np ≤ Ns.

Page 30: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

30

ASSUMPTIONS AND PROBLEM DEFINITION

Hence, the resource rd used on each protected component is given by

Page 31: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

31

ASSUMPTIONS AND PROBLEM DEFINITION

As the attacker cannot distinguish the differences between unprotected, protected, camouflaging, or voting components, the selection of components to attack is random.

Assume the total amount of resources that an attacker has is Ra and they are evenly distributed to attack a subset of components Na (1 ≤ Na ≤ Ns + Nc), the amount of resources allocated to each attacked component is :

Page 32: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

32

ASSUMPTIONS AND PROBLEM DEFINITION

Based on Levitin et al. [8]–[11], the attack success probability on a single component can be modeled by a contest success function given in :

where ra and rd are the amount of resources invested by attacker and defender , and Pa is the attack success probability

When the contest intensity indicator m = +∞, the attack success probability function (4) reduces to winner-takes-all, i.e., whoever invests more effort wins the game.

Page 33: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

33

ASSUMPTIONS AND PROBLEM DEFINITION

We consider the defender assumes the worst-case scenario [30], i.e., the attacker knows the defender’s resource information and defense strategies.

An upper bound on attack resources (i.e., Ra) would be a combination of favorable-for-the-attacker values of the following: requisite attacker skill-level; time budget for the attack; and the computation and communication expenditures for an attack.

Page 34: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

34

ASSUMPTIONS AND PROBLEM DEFINITION

In summary, we make the following assumptions regarding the defender and attacker’s knowledge :

1) Public information shared by the defender and the attacker:a) The amount of resources that the defender and the attacker have, i.e.,

the value of Rd and Ra.b) The cost for creating a camouflaging component, i.e., the value of C.c) The number of system components and camouflaging components,

i.e., Ns and Nc

d) The reliability of a system component without protection hardening, i.e., the value of p.

Page 35: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

35

ASSUMPTIONS AND PROBLEM DEFINITION

2) Private information :a) The defender does not know which components are currently being

attacked.b) The attacker cannot differentiate unprotected, protected,

camouflaging, and voting components.c) The attacker does not know which components are voting components.

If the number of voting components is no larger than the number of protected components, it is obvious, from the defender’s perspective, that the voting components should only be chosen from the protected set.

Page 36: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

36

ASSUMPTIONS AND PROBLEM DEFINITION

Based on the above discussion, we formulate the problem of improving system reliability against rational attacks as follows:

where P(Nc,Np,Nv,Na) is the system reliability under the given values.

Page 37: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

37

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 38: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

38

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

Assume the defender has made the decisions on the value of :Nc

Np(0 ≤ Np ≤ Ns)Nv(1 ≤ Nv ≤ Ns)

The attacker has made his/her decision on the value of :Na (1 ≤ Na ≤ Ns +Nc)

Page 39: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

39

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

We only need to consider the attacks that target the voting components.

Assume out of Na attacked components are voting components, the range of is :

The probability, δ( , Na), that the attacker targets exactly Nv a voting components is :

vaN

vaN

vaN

Page 40: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

40

In order to obtain the system reliability, we need to know the number of compromised voting components ( ) in a voting process :

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

fvN

Page 41: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

41

The probability that a correct result is obtained through a majority voting when components are compromised is :

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

fvN

Page 42: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

42

According to the system model : If Nv ≤ Np

=

However, if Nv > Np

the range of is :

The probability that out of attacked voting components are protected components is given by :

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

pvaN

vaN

pvaN

pvaN

vaN

Page 43: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

43

The system reliability is :

P(Nc,Np,Nv,Na) =

where lb = Na − Ns − Nc + Nv,

and

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

Page 44: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

44

An Example(Example3) : Create Nc = 3 camouflaging components Allocate the remaining resource to protect Np = 3 components Choose these 3 protected components as voters, that is Nv = 3 Attacker randomly selects Na=4 components to attack The amount of attack resource on each attacked component is ra = Ra/Na= 18/4 =4.5

The amount of defense resource on each protected component is rd=(Rd-Nc*C)/Np=(18-3*2)/3=4

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

Page 45: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

45

Based on the information and (6), the number of the attacked voting components ranges from 0 to 3.

The probability that the attacker attacks exactly voting components is :

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

vaN

vaN

Page 46: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

46

In addition, as ra > rd , from (8), we know = The probability that a correct result is obtained when components are compromised is :

Therefore, based on (12), the system reliability is :

P(3,3,3,4)

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

fvN

vaN

fvN

Page 47: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

47

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 48: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

48

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKSFor a fixed number of camouflaging components Nc (0 ≤ Nc ≤ Rd/C), a defender can vary the value of Np and Nv.

As : Np ranges from 0 to Ns

Nv ranges from 1 to Ns

Therefore, the total number of strategies the defender can choose is Sd = (Ns + 1)Ns.

Page 49: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

49

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKSFor a given Nc, the i th (1 ≤ i ≤ Sd ) defense strategy corresponds to when Np = (i − 1)/Ns and Nv = i − Ns × + Ns.

For the attacker : the number of attacked components ranges from 1 to (Ns + Nc) the total number of possible attack strategies is Sa = Ns + Nc

the j th (1 ≤ j ≤ Sa) attack strategy is Na = j

When both the defense strategy (Nc,Np,Nv) and the attack strategy (Na) are determined, the system reliability can be calculated by using (12).

/ si N

Page 50: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

50

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKS

We define a matrix M = (r i,j)Sd×Sa to record the system

reliability under each possible defense and attack strategy, where ri,j refers to the system reliability when the defender chooses the i th defense strategy and the attacker chooses the j th attack strategy.

In other words, , ( , ( 1) / , * / , )i j c s s s sr P N i N i N i N N j

Page 51: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

51

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKS Clearly, for each defense strategy, depending on which attack strategy is taken by an attacker, the system reliability can vary.

We introduce two vectors:

= [x1, . . . , xSd ]T

= [y1, . . . , ySa ]T

where xi ∈ {0, 1} and yj ∈ {0, 1}

Since a defender and an attacker can choose only one strategy at a time, we have :

XSSSSSSSSSSSSSS

YSSSSSSSSSSSSSS

1 1

1, 1d aS S

i ji j

x and y

Page 52: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

52

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKSBased on the defense strategy selection vector and the attack strategy selection vector , the system reliability is :

The objective of the defender is to maximize the system reliability under the worst-case scenario. In other words, the defender’s objective is to maximize Pmin :

YSSSSSSSSSSSSSS

XSSSSSSSSSSSSSS

Page 53: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

53

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKS

Page 54: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

54

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKSExample 4 :

Assume: a system consists of Ns = 5 functional components the reliability of the components is p = 0.95 the defender resource Rd = 35 units the attacker resource Ra = 20 units the cost for creating a camouflaging component is C = 3 units of resources

the defender creates two camouflaging components, i.e., Nc = 2.

Page 55: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

55

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKS The total number of defense strategies is Sd = (Ns+1)Ns = 6×5 = 30

The total number of attack strategies is Sa = Ns + Nc = 7

Matrix M = (ri,j)30×7 stores the system reliability under each possible defense and attack strategy, where ri,j=

Based on the given values, i.e., Ns, Ra, p, Rd , Nc, and C and follow Algorithm 1 : x18 = 1 Pmaxmin = 0.9541

Np =

NV = P = 0.9541

(2, ( 1) / 5 , 5* / 5 5, )P i i i j

( 1) / 17 / 5 3si N * / 18 20 5 3s s si N i N N

Page 56: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

56

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKSNow, we relax the constraint and let Nc vary from 0 to

:/dR C

Page 57: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

57

ALGORITHMS TO DETERMINE DEFENSE STRATEGY AGAINST RATIONAL ATTACKS Example 5 :

the maximum number of camouflaging components that can be created is under each resource allocation of camouflaging component creation, the

system’s maximal reliability and the corresponding number of protected and voting components are:

/ 1 40 / 3 1 14dR C

Page 58: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

58

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 59: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

59

SYSTEM RELIABILITY UNDER GIVEN DEFENSE AND ATTACK STRATEGIES

We study how the defense resources impact the defender’s strategy :a system consists of 7 replicas(Ns) the reliability of each replicated component(p) is 0.95attack resources(Ra) is 40 units the cost for creating a camouflaging component(C) is 3 unitsThe amount of defense resources(Rd)is increased from 10 to 110 units

Page 60: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

60

SIMULATION RESULTS It is worth mentioning that there is no particular preference when deciding the amount of attack resources.

We set the amount of attack resources to 40 units and the range of defense resources from 10 to 110 units so that we are able to see how the defense strategy changes under different cases, i.e., the amount of defense resources is less than, equal to, and greater than the amount of attack resources.

Page 61: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

61

SIMULATION RESULTS

Page 62: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

62

SIMULATION RESULTSFrom Fig. 3, we observe the following :

1)When the amount of defense resources is small, the defender should allocate resources to protect a small set of functional components (Line L2 in Fig. 3) and choose these protected components to vote (Line L3 in Fig. 3).

2)As the amount of defense resources increases, the defender should protect more components (Line L2 in Fig. 3) and choose these as voting components as well (Line L3 in Fig. 3).

Page 63: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

63

SIMULATION RESULTSFrom Fig. 3, we observe the following(cont.) :

3)All protected components should participate in the voting (Lines L2 and L3 in Fig. 3).

4)The unreliability of the system decreases, i.e., the system’s reliability increases, as the amount of defense resources increases. (Line L4 in Fig. 3).

5)When the amount of defense resources increases, the defender should create more camouflaging components (Line L1 in Fig. 3).

Page 64: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

64

SIMULATION RESULTS In this experiment, the system reliability is evaluated under the worst-case scenario.

Therefore, when the attacker randomly selects his/her strategy, i.e., the attack strategies have uniform probability, the system’s expected reliability will be greater than or equal to the maximized minimum reliability.

Page 65: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

65

SIMULATION RESULTS

Page 66: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

66

SIMULATION RESULTSWe analyze the effect of the amount of attack resources on defender’s strategies and system reliability :Rd =40C=3p=0.95Ns=7The amount of attack resources(Ra) increases from 10 to 110 units.

Page 67: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

67

SIMULATION RESULTS

Page 68: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

68

SIMULATION RESULTSWhen the amount of attack resources is small, i.e., Ra = 10, all of the system components are protected and chosen to vote (Line L2 and L3 in Fig. 5).

However, when the amount of attack resources increases, i.e., Ra = 30, there is only one component being protected in the hopes that the voting component survives the attack (Line L2 and L3 in Fig. 5).

Page 69: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

69

SIMULATION RESULTSIn addition, we can see that when the amount of attack resources increases, the system reliability decreases (Line L4 in Fig. 5).

When the amount of attack resources increases from 50 units to 110 units, the number of camouflaging components changes drastically (Line L1 in Fig. 5).

Page 70: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

70

SIMULATION RESULTS

Page 71: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

71

SIMULATION RESULTSWe compare the system reliability when the number of voting components is fixed versus when it is optimally decided by the algorithm : Ra = 40 C = 3 p = 0.95 Ns = 7 The value of Nv is set to constant 1, 3, 5, and 7, or chosen by the Algorithm 2, respectively.

Page 72: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

72

SIMULATION RESULTS

Page 73: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

73

AGENDAIntroductionRelated WorkAssumptions and Problem DefinitionSystem Reliability under Given Defense and Attack Strategies

Algorithms to Determine Defense Strategy Against Rational Attacks

Simulation ResultsConclusion

Page 74: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

74

CONCLUSIONRedundancy and voting schemes are often used to tolerate natural-caused component failures.

When a system is under intentional cyber attacks, the system reliability is not necessarily proportional to the number of redundancies of voting components.

This paper analyzed system reliability when both a defender and an attacker were given a fixed amount of resources and studied how their resource allocation strategies impacted system reliability.

Page 75: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

75

CONCLUSIONDevelop an algorithm for system defenders to optimally allocate their resources and decide the number of voting components so that the system reliability was maximized even under the scenario that was most favorable to attackers.

When a defender had sparse resources compared to what the attacker had, the defender should invest the resources into protecting a fewer number of components and select only the protected components for voting.

If the resources were abundant, the defender should increase the number of protected components and allow more components to vote.

Page 76: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

76

CONCLUSIONWe only considered that components can be compromised while the communication channel for the voting protocol is reliable.

In reality, communication channels played an important role when it comes to the system reliability, often times they are the target of attacks.

When network reliability was taken into consideration, less communication in reaching a consensus could imply higher reliability of the consensus; on the other hand, fewer voting participants (less communication) could result in lower reliability.

Page 77: Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1

77

THANKS FOR YOUR LISTENING