Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques

With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD) is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the “gradient method” and “game theory” are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.

[1]  S. Skaperdas Contest success functions , 1996 .

[2]  Gregory Levitin,et al.  Parallel systems under two sequential attacks , 2009, Reliab. Eng. Syst. Saf..

[3]  Ahmed E. Kamal,et al.  Survivability strategies in multihop wireless networks [Accepted From Open Call] , 2010, IEEE Wireless Communications.

[4]  Wei Jiang,et al.  Optimal Network Security Strengthening Using Attack-Defense Game Model , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[5]  Alfons H. Salden,et al.  Self-organizing mobile surveillance security networks , 2007, 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems.

[6]  Sirin Tekinay,et al.  A survey of game-theoretic approaches in wireless sensor networks , 2008, Comput. Networks.

[7]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[8]  Pei-Yu Chen,et al.  Network recovery strategies for maximization of network survivability , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[9]  Gregory Levitin,et al.  Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Y.-S. Lin,et al.  Evaluation of network robustness for given defense resource allocation strategies , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[11]  Wei Jiang,et al.  A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[12]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[13]  Abhay Kumar Rai,et al.  Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .

[14]  T. Başar,et al.  An Intrusion Detection Game with Limited Observations , 2005 .

[15]  Hong-Hsu Yen,et al.  Evaluation of Network Survivability Considering Degree of Disconnectivity , 2011, HAIS.

[16]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[17]  Joseph Migga Kizza Security Threats to Computer Networks , 2013 .

[18]  Gregory Levitin,et al.  Protection vs. false targets in series systems , 2009, Reliab. Eng. Syst. Saf..

[19]  S. Rahman Reliability Engineering and System Safety , 2011 .

[20]  Eytan Modiano,et al.  Network Reliability With Geographically Correlated Failures , 2010, 2010 Proceedings IEEE INFOCOM.