False Targets in Defence Strategies against Intentional Attacks
نویسندگان
چکیده
The paper presents a generalized model of damage caused to a complex multistate series-parallel system by intentional attacks. The model takes into account the defence strategy that presumes separation and protection of system elements and deployment of false targets. The defence strategy optimization methodology is suggested, based on the assumption that the attacker tries to maximize the expected damage of an attack. An optimization algorithm is presented that uses a universal generating function technique for evaluating the losses caused by system performance reduction and a genetic algorithm for determining the optimal defence strategy. The role of the fault targets in the optimal defence strategy is analyzed. Illustrative example of defence strategy optimization is presented.
منابع مشابه
False Targets vs. Protection in defending Parallel Systems against Unintentional and Intentional Impacts
This article considers a parallel system exposed to external intentional impacts caused by malicious attacks, and unintentional impacts caused by natural disasters or technological accidents. The defender distributes its resource between the deployment of false targets and the protection of genuine system elements. The deployment of false targets is intended to misinform the attacker so that it...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملA Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks
This paper describes a set of criteria for evaluating defence mechanisms against flooding denial of service (DoS) attacks. Effectiveness and usefulness of a defence mechanism in mitigating a DoS attack depends on many issues which are presented here in the form of a taxonomy. The primary goal of this taxonomy is to help in getting a comprehensive view on both the strengths and weaknesses of a s...
متن کاملDefence against denial of service in self-aware networks
Denial of Service (DoS) has become a prevalent threat in today’s networks. Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS attacks are not as difficult to launch as one would expect. Protection against them is, however, disproportionately difficult. Despite the extensive research in recent years, DoS attacks continue to harm. In o...
متن کاملFuzzy-based Energy Efficient Method for Multiple Attacks in Sensor Networks: against False Vote and Report Injection Attacks
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the energy consumption of each node. To prevent...
متن کامل