Resource allocation in two-layered cyber-defense

被引:3
作者
Atkinson, Michael P. P. [1 ]
Kress, Moshe [1 ]
机构
[1] Naval Postgrad Sch, Operat Res Dept, Monterey, CA 93943 USA
关键词
allocation game; cyber; de-militarized zone; stochastic duel; BALLISTIC-MISSILE DEFENSE; COLONEL-BLOTTO; MODEL; SYSTEMS;
D O I
10.1002/nav.22106
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
A common network security approach is to create a De-Militarized Zone (DMZ) comprising two layers of network defense. The DMZ structure provides an extra layer of security between the sensitive information in a network (e.g., research and development files) and the component of the network that must interface with the general internet (e.g., the mail server). We consider a cyber-attack on a DMZ network where both attacker and defender have limited resources and capabilities to attack and defend, respectively. We study two optimization problems and one game-theoretic problem. Given that the attacker (defender) knows the potential capabilities of the defender (attacker) in the two layers, we obtain the optimal allocation of resources for the attacker (defender). The two-optimization problems are not symmetrical. Absent any knowledge regarding the allocation of the adversary's resources, we solve a game-theoretic problem and obtain some operational insights regarding the effect of combat (e.g., cyber) capabilities and their optimal allocation.
引用
收藏
页码:574 / 583
页数:10
相关论文
共 43 条
[1]   Modeling Short-Range Ballistic Missile Defense and Israel's Iron Dome System [J].
Armstrong, Michael J. .
OPERATIONS RESEARCH, 2014, 62 (05) :1028-1039
[2]   A stochastic salvo model for naval surface combat [J].
Armstrong, MJ .
OPERATIONS RESEARCH, 2005, 53 (05) :830-841
[3]   Protection of simple series and parallel systems with components of different values [J].
Bier, VM ;
Nagaraj, A ;
Abhichandani, V .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2005, 87 (03) :315-323
[4]  
Blackett D. W., 1958, NAV RES LOG, V5, P107
[5]  
Cai Huaiping, 2006, Journal of Systems Engineering and Electronics, V17, P559, DOI 10.1016/S1004-4132(06)60097-2
[6]  
Canadian Institute for Cybersecurity, 2023, U NEW BRUNSW
[7]   The game-theoretic model and experimental investigation of cyber wargaming [J].
Colbert, Edward J. M. ;
Kott, Alexander ;
Knachel, Lawrence P. .
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2020, 17 (01) :21-38
[8]  
Dadheech K., 2018, P 2 INT C INV COMM C
[9]   Approximate dynamic programming for missile defense interceptor fire control [J].
Davis, Michael T. ;
Robbins, Matthew J. ;
Lunday, Brian J. .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2017, 259 (03) :873-886
[10]  
Draeger J., 2018, ARXIV