False Targets in Defence Strategies against Intentional Attacks

نویسندگان

  • GREGORY LEVITIN
  • Gregory Levitin
چکیده

The paper presents a generalized model of damage caused to a complex multistate series-parallel system by intentional attacks. The model takes into account the defence strategy that presumes separation and protection of system elements and deployment of false targets. The defence strategy optimization methodology is suggested, based on the assumption that the attacker tries to maximize the expected damage of an attack. An optimization algorithm is presented that uses a universal generating function technique for evaluating the losses caused by system performance reduction and a genetic algorithm for determining the optimal defence strategy. The role of the fault targets in the optimal defence strategy is analyzed. Illustrative example of defence strategy optimization is presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

False Targets vs. Protection in defending Parallel Systems against Unintentional and Intentional Impacts

This article considers a parallel system exposed to external intentional impacts caused by malicious attacks, and unintentional impacts caused by natural disasters or technological accidents. The defender distributes its resource between the deployment of false targets and the protection of genuine system elements. The deployment of false targets is intended to misinform the attacker so that it...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

A Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks

This paper describes a set of criteria for evaluating defence mechanisms against flooding denial of service (DoS) attacks. Effectiveness and usefulness of a defence mechanism in mitigating a DoS attack depends on many issues which are presented here in the form of a taxonomy. The primary goal of this taxonomy is to help in getting a comprehensive view on both the strengths and weaknesses of a s...

متن کامل

Defence against denial of service in self-aware networks

Denial of Service (DoS) has become a prevalent threat in today’s networks. Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS attacks are not as difficult to launch as one would expect. Protection against them is, however, disproportionately difficult. Despite the extensive research in recent years, DoS attacks continue to harm. In o...

متن کامل

Fuzzy-based Energy Efficient Method for Multiple Attacks in Sensor Networks: against False Vote and Report Injection Attacks

An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the energy consumption of each node. To prevent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009