Systems under attack-survivability rather than reliability: Concept, results, and applications

In this paper, we introduce the concept of system survivability under attack in analogy with system reliability. The problem is very important particularly nowadays when the world witnesses a large variety of intelligent threats including terrorism, rebellions, civil wars, pirating, and so on. We limit consideration to the discrete case. We define a component/system survivability to be the probability that the system/component continues functioning upon attack. We specify the differences between our suggested concept of system survivability and the traditional one of system reliability. Most often, the survivability follows a Bernoulli distribution for which the survival probability is derived based on the system configuration. We develop results for series, parallel, series-parallel, parallel-series and k-out-of-n systems. We also provide the expected number of attacks for each system configuration based on the particular attack strategy both for single and multiple attacks. We illustrate the process through a real application.

[1]  Kjell Hausken Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..

[2]  Suleyman Kondakci Analysis of information security reliability: A tutorial , 2015, Reliab. Eng. Syst. Saf..

[3]  C. Zhang,et al.  A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis , 2016, Eur. J. Oper. Res..

[4]  M. Naceur Azaiez A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies , 2009 .

[5]  Inmaculada Rodríguez Martín,et al.  A branch-and-cut algorithm for two-level survivable network design problems , 2016, Comput. Oper. Res..

[6]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[7]  Kjell Hausken,et al.  Protection vs. redundancy in homogeneous parallel systems , 2008, Reliab. Eng. Syst. Saf..

[8]  Kjell Hausken and Gregory Levitin Review of Systems Defense and Attack Models , 2012, International Journal of Performability Engineering.

[9]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[10]  Jing Zhang,et al.  The impacts of adaptive attacking and defending strategies on mitigation of intentional threats , 2010, Kybernetes.

[11]  Vicki M. Bier,et al.  Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .

[12]  Mehdi Mrad,et al.  System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale , 2015 .

[13]  Seth D. Guikema,et al.  Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .

[14]  Michael G.H. Bell,et al.  Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport , 2009 .

[15]  Mohamed Naceur Azaiez,et al.  Minimizing Expected Attacking Cost in Networks , 2010, Electron. Notes Discret. Math..

[16]  David W. Coit,et al.  Data survivability vs. security in information systems , 2012, Reliab. Eng. Syst. Saf..

[17]  Gregory Levitin,et al.  Resource distribution in multiple attacks with imperfect detection of the attack outcome. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[18]  David L. Banks,et al.  Adversarial Risk Analysis : Analyses of Borel Games , 2011 .

[19]  Gregory Levitin,et al.  Parallel systems under two sequential attacks , 2009, Reliab. Eng. Syst. Saf..

[20]  Gregory Levitin and Kjell Hausken K-Round Duel with Uneven Resource Distribution , 2012 .

[21]  Yogesh Kumar Agarwal,et al.  Near optimal design of wavelength routed optical networks , 2016, Eur. J. Oper. Res..

[22]  Jiang Lu,et al.  Robust Cyber-Physical Systems: Concept, models, and implementation , 2016, Future Gener. Comput. Syst..

[23]  Kjell Hausken,et al.  Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..

[24]  Gregory Levitin,et al.  Shield versus sword resource distribution in K-round duels , 2011, Central Eur. J. Oper. Res..

[25]  Abdullah Konak,et al.  A Game-Theoretic Genetic Algorithm for the reliable server assignment problem under attacks , 2015, Comput. Ind. Eng..

[26]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[27]  Gregory Levitin,et al.  Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..

[28]  Ling Rothrock,et al.  Systematic analysis of framing bias in missile defense: Implications toward visualization design , 2007, Eur. J. Oper. Res..

[29]  Inna Pivkina,et al.  Proactively applied encryption in multipath networks , 2016, Comput. Secur..

[30]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[31]  Alan T. Murray,et al.  Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..

[32]  Young-Soo Myung,et al.  A cutting plane algorithm for computing k , 2004, Eur. J. Oper. Res..

[33]  Gregory Levitin,et al.  Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[34]  George E Apostolakis,et al.  A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  Maria Paola Scaparra,et al.  Optimizing dynamic investment decisions for railway systems protection , 2016, Eur. J. Oper. Res..

[36]  Youan Zhang,et al.  Cooperative simultaneous attack of multi-missiles under unreliable and noisy communication network: A consensus scheme of impact time , 2015 .

[37]  Charles E Ebeling,et al.  An Introduction to Reliability and Maintainability Engineering , 1996 .

[38]  Alan T. Murray,et al.  Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..

[39]  Louis Anthony Tony Cox,et al.  Making Telecommunications Networks Resilient against Terrorist Attacks , 2009 .

[40]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..