Redundancy vs. Protection vs. False Targets for Systems

Download Report

Transcript Redundancy vs. Protection vs. False Targets for Systems

REDUNDANCY VS. PROTECTION
VS. FALSE TARGETS FOR
SYSTEMS UNDER ATTACK
Gregory Levitin, Senior Member, IEEE, and Kjell Hausken
IEEE Transactions on Reliability
Vol. 58, No.1, March 2009
Advisor: Frank Yeong-Sung, Lin
Presented by : Hui-Yu, Chung
1
Agenda
Introduction
 The Model
 Determining the Optimal Strategies
 Considering Intervals of the Contest
Intensity
 Conclusions

2
Introduction

Resources of The Defender
◦ Three measures to remain survivability
 Deploying redundant genuine elements (GE)
 Deploy false elements (FE) to attract the attacker
 Protecting some of the GE

Resources of The Attacker
◦ The Attacker’s object is to maximize damage
 But the Attacker is expected to expend resources on
both GE and FEs.
3
Introduction

Defender’s strategy
◦ How to allocate its resource between GE, FE,
and protect GE

Attacker’s strategy
◦ How many elements to attack

Two period game with minmax defender
strategy
◦ First period: defender, second period: attacker
◦ Minimize the maximum risk
4
Basic Aefinition & Acronym
Genuine system element (GE)
• Lowest-level part of the system characterized by performance g,
and cost x
False Elements (FE)
• Imitation of GE that has actual performance 0, and cost y
Element
• Either GE, or FE
Vulnerability
• Conditional probability of element destruction even it is attacked
Protection
• Technical or organizational measure aimed at reduction of
element vulnerability
5
Nomenclatures
6
Assumptions
The attacker cannot distinguish between
GE and FE
 Both the attacker/defender
attacks/protects each element with equal
resources
 Considering a non-strategic attacker
(fixed attack or fixed attack probability)
 Both the attacker and the defender have
limited, fixed resources

7
Agenda
Introduction
 The Model
 Determining the Optimal Strategies
 Considering Intervals of the Contest
Intensity
 Conclusions

8
The Model

All parameters are known by both the
defender and the attacker
◦ except the attacker cannot distinguish GE and
FE

The system is built to meet a demand H:
Ng  H
H
/
g



 Minimal elements required:
 Total resource cannot exceed r: Nx  r
→r  x H / g 
9
The Model
The attacker attacks Q  N  F elements
 The attacked unprotected GE can be destroyed with
fixed probability b.
 Using the most conservative defense policy

◦ Assuming a maximum attacker’s budget
Defender Side
Attacker Side
Measures
Increase GE
Deploy FE
Protect GE
Attack elements
Resource
Needed
x
y
t  (r  Nx  Fy) / K
T R /Q
10
Contest Success Function

Attack success probability (vulnerability)
for each protected GE

Contest Intensity Parameter m
◦ Reflect how the survivability of the system
depends on the resources expanded
11
Contest Success Function

Contest intensity parameter m:
m=0
v = 50%
t and T have equal impact on vulnerability
0<m<1
Disproportional advantage of investing less than
the opponent
m=1
The investments have proportional impact on
vulnerability
m>1
Disproportional advantage of investing more
effort than opponent (economics of scare)
m =
Winner-takes-all
12
Problem Formulation

The prob. that attacker attacks exactly n GE is

For any n, the conditional prob. That exactly k out of n
attacked GE are protected is

The prob. That exactly n GE are attacked, and among
them k GE are protected is
P(A  B)  P(A) P(B| A)
13
Problem Formulation

The conditional prob. That exactly s out of
k protected attacked GE are destroyed is

The prob. That exactly n GE are attacked,
e out of the n - k attacked unprotected
elements are destroyed is
14
Problem Formulation

pj :The prob. That exactly j elements are
destroyed by the attack, which is the sum
of prob. Of all possible combinations that
produce the same value of j. ( j = s + e)
# of protected attacked
GE, k, can range from
max{0,Q – N + K} to min{n, K}
# of attacked GE, n,
can range from max{0,Q - F}
to min{Q, N}
Destroyed unprotected elements
Unprotected elements
15
Problem Formulation

If b = 1 → e = n - k
16
Algorithm

Which obtains the prob. of different number of GE destroyed by attack Q
elements
17
Measures of risk


In terns of expected damage:
Damage exists when j  N  H / g 

In terns of system vulnerability:
◦ (prob. Of not meeting the demand)
18
Agenda
Introduction
 The Model
 Determining the Optimal Strategies
 Considering Intervals of the Contest
Intensity
 Conclusions

19
The Optimal Strategies

The optimal defender can be a solution of
a minmax game that minimize the risk 
given that for any N, F, K, the attacker
chooses Q elements to attack to maximize
the risk  .
20
The Optimal Strategies

The risk  can be replaced by D or V
21
Solutions

Solutions for different contest intensities
◦ H = 10, g = 2, y = 1, x = 3, b = 1, R = 10, r = 40
22
Solutions

The solution of the two measures of risk
(considering expected damage and system
vulnerability) are similar
With small m
→ Increase system redundancy with minimal
protection, and FE is less important.
 Increasing m
→ FE becomes more important
 Larger m
→ Since attacker only attacks a subset of the
elements, FE slightly decreases.

23
Agenda
Introduction
 The Model
 Determining the Optimal Strategies
 Considering Intervals of the Contest
Intensity
 Conclusions

24
Intervals of the Contest Intensity
In many practical situations, the values of
the contest intensities cannot be exactly
determined.
 Most conservative defense strategy

→ Consider most favorable m for the attacker

The defender’s strategy is to choose N*,
F*, K* that minimize the risk under
attacker’s optimal strategy Q = Q*(N, K, F,
m) in the range mmin  m  mmax
25
Intervals of the Contest Intensity

Algorithm
In this case, m  0.04(mmax  mmin )
26
Optimal defender’s minmax
strategies as a function of r

H = 10, g = 2, y = 1, b = 1, R = 10, x = 3
27
Optimal defender’s minmax
strategies as a function of x

H = 10, g = 2, y = 1, b = 1, R = 10, r = 50
28
Optimal defender’s minmax
strategies

The influence when increasing the
defender’s resource is similar to the
influence when decreasing the GE cost.

Small m
→Need large N → more sensitive to N
Intermediate m
→Prefer large F → less sensitive to N
Large m
→Need to protect GE → N decreases


29
Optimal defender’s minmax
strategies as a function of R

H = 10, g = 2, x= 3, y = 1, b = 1, r = 30
30
Optimal defender’s minmax
strategies as a function of R

With the growth of R, the defender must
decrease the number of GE and K/N, to
allocate more resource to protect some of
the GE.

Low attacker resource
◦ The defender benefits from high contest intensity

High attacker resource
◦ The defender benefits form small contest
intensity
◦ The attacker benefits from intermediate contest
intensity
31
Optimal defender’s minmax
strategies as a function of b

H = 10, g = 2, x= 3, y = 1, r = 30, R = 10
32
Optimal defender’s minmax
strategies as a function of b

With the growth of b, the importance of
protecting GE increases

Defender protect more GE
→ Limits the # of GE that can be deployed
→ Deploy more FE to compensate

K<N
→ The expected damage increases

K=N
→ No unprotected GE
→ b has no effect on expected damage
33
Considering Optimal FE

The number of FE, F, is most sensitive to
variation of the game parameter m, x, r,
and R.
◦ The cost of FE is lower than GE
◦ Balance?
34
Considering Optimal FE

F = 10, g = 2, y = 1, x = 3, b = 1, R = 10, 1 < m < 5
35
Considering Optimal FE
Consider a fixed and optimal number of
FE
 When r grows, the difference between D
corresponding to different fixed values of
F decreases.

◦ If the defender has enough resources, nonoptimal F can be compensated by other
defensive measures.
36
Agenda
Introduction
 The Model
 Determining the Optimal Strategies
 Considering Intervals of the Contest
Intensity
 Conclusions

37
Conclusions
Using a two-period minmax game to
analyze the defender’s strategy.
 Considering the system redundancy, # of
FEs, and protection resource

◦ Small m : high system redundancy with
minimum protection, low FE
◦ Intermediate m: redundancy decreased, FE
increased, invest more on protection
◦ High m: FE decreases (since attacker attacks
only part of the elements)
38
Conclusions

Considering non-certain determined
contest intensities, the influence on
defender’s increase of resource is similar
to the influence on decrease of the GE
cost.

Low GE cost/ High defender’s resource:
◦ The defender benefits from extremely low m

High GE cost/ Low defender’s resource:
◦ The attacker benefits from intermediate m
39
Conclusions
When the attacker’s resource is high, the
defender need to lower the ration of
protected GE and deployed GE to make
more effort on protecting them.
 Low attacker resource:

◦ Defender benefits from large m

High attacker resource:
◦ The defender benefits from low m
◦ The attacker benefits from intermediate m
40
Conclusions

The balance between deploying more FE,
spending more resources toward protection
of the GE, depends on the agents’ resources,
the contest intensity, and the relative cost of
deploying FE an GE.
◦ While the optimal # of FE provides lowest
possible expected damage, some other # of FE
may differ from the possible lowest one.

Future works can concern on cost and
budget issues
41
THANKS FOR YOUR LISTENING~!!!
42