On the reliability of a voting system under cyber attacks

被引:6
作者
Li, Yijia [1 ]
Hu, Xiaoxiao [1 ]
Zhao, Peng [2 ]
机构
[1] Lanzhou Univ, Ctr Data Sci, Sch Math & Stat, Lanzhou, Peoples R China
[2] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple attacks; Poisson process; Stochastic order; Truncated normal distribution; OPTIMIZATION; REDUNDANCY;
D O I
10.1016/j.ress.2021.107996
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Voting systems have been widely used in many areas due to their technical decision making abilities. However, when a voting system operates on any internet platform, it faces a number of potential vulnerabilities including malware and denial of service attacks. In this work, we study the reliability of a majority voting system under cyber threats. Three multiple attack scenarios are considered including targeted, random, and dynamic attacks. We show that under some conditions, the reliability of a voting system decreases with the number of attacked voting components for the targeted attacks; however, for the random attacks, the reliability of a voting system can increase with the number of attacked voting components. For the dynamic attacks, it is discovered that the reliability of a voting system is significantly impacted by the attack rate and the random proposition time. We further develop efficient algorithms for computing the reliability of voting systems which can be employed in practice.
引用
收藏
页数:12
相关论文
共 44 条
  • [1] Application of Bayesian Networks in Reliability Evaluation
    Cai, Baoping
    Kong, Xiangdi
    Liu, Yonghong
    Lin, Jing
    Yuan, Xiaobing
    Xu, Hongqi
    Ji, Renjie
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (04) : 2146 - 2157
  • [2] Availability-based engineering resilience metric and its corresponding evaluation methodology
    Cai, Baoping
    Xie, Min
    Liu, Yonghong
    Liu, Yiliu
    Feng, Qiang
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 172 : 216 - 224
  • [3] Using Bayesian networks in reliability evaluation for subsea blowout preventer control system
    Cai, Baoping
    Liu, Yonghong
    Liu, Zengkai
    Tian, Xiaojie
    Dong, Xin
    Yu, Shilin
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 108 : 32 - 41
  • [4] Chen L., 1978, FTCS-8. The Eighth Annual International Conference on Fault-Tolerant Computing, P3
  • [5] Gharbi A., 2010, Electron. Notes Discr. Math., V36, P947
  • [6] Gogiashvili Z., 2000, PROC 2 INT C MATH ME, P463
  • [7] Guo Minzhe, 2014, P 9 ANN CYB INF SEC, P41, DOI 10.1145/2602087.2602116
  • [8] Cyber resilience in firms, organizations and societies
    Hausken, Kjell
    [J]. INTERNET OF THINGS, 2020, 11
  • [9] Protecting complex infrastructures against multiple strategic attackers
    Hausken, Kjell
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2011, 42 (01) : 11 - 29
  • [10] Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization
    Hu, Xiaoxiao
    Xu, Maochao
    Xu, Shouhuai
    Zhao, Peng
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 159 : 119 - 133