Strategic Defense and Attack of Complex Networks

This article shows how policy choices about defense and attack investments at the component level can be made for arbitrarily complex networks and systems. Components can be in series, parallel, interdependent, interlinked, independent, or combinations of these. Investments and utilities are determined for the defender and attacker dependent on their unit costs of investment and contest intensity for each component, and their evaluations of the value of system functionality.

[1]  David W. Coit,et al.  Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..

[2]  K. Hausken Production and Conflict Models Versus Rent-Seeking Models , 2005 .

[3]  K. Hausken Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[5]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[6]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[7]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[8]  J. Nash,et al.  NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[9]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[10]  S. Skaperdas Contest success functions , 1996 .

[11]  G. Tullock Efficient Rent Seeking , 2001 .

[12]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[13]  George E. Apostolakis,et al.  Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..

[14]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[15]  C. Shapiro,et al.  Network Externalities, Competition, and Compatibility , 1985 .

[16]  K. Hausken Income, interdependence, and substitution effects affecting incentives for security investment , 2006 .

[17]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[18]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[19]  J. Hirshleifer Anarchy and its Breakdown , 1995, Journal of Political Economy.

[20]  Manfred Kochen,et al.  Small World , 2002 .

[21]  Gregory Levitin,et al.  Optimizing survivability of vulnerable series-parallel multi-state systems , 2003, Reliab. Eng. Syst. Saf..

[22]  Ying-Cheng Lai,et al.  Attack vulnerability of scale-free networks due to cascading breakdown. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[23]  Jacques Periaux,et al.  Combining game theory and genetic algorithms with application to DDM-nozzle optimization problems , 2001 .

[24]  Robert E. Marks,et al.  Playing Games with Genetic Algorithms , 2002 .

[25]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[26]  Gregory Levitin Genetic algorithms in reliability engineering , 2006, Reliab. Eng. Syst. Saf..

[27]  Kjell Hausken Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..

[28]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[29]  C. E. Lemke,et al.  Equilibrium Points of Bimatrix Games , 1964 .

[30]  L. Darrell Whitley,et al.  The GENITOR Algorithm and Selection Pressure: Why Rank-Based Allocation of Reproductive Trials is Best , 1989, ICGA.

[31]  J M Carlson,et al.  Highly optimized tolerance: a mechanism for power laws in designed systems. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[32]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[33]  G. Tullock THE WELFARE COSTS OF TARIFFS, MONOPOLIES, AND THEFT , 1967 .

[34]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[35]  B. Stengel,et al.  COMPUTING EQUILIBRIA FOR TWO-PERSON GAMES , 1996 .

[36]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[37]  H. Simon,et al.  A Behavioral Model of Rational Choice , 1955 .

[38]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[39]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[40]  Gregory Levitin,et al.  Computational Intelligence in Reliability Engineering: Evolutionary Techniques in Reliability Analysis and Optimization , 2006, Studies in Computational Intelligence.

[41]  Gregory Levitin Optimal Defense Strategy Against Intentional Attacks , 2007, IEEE Transactions on Reliability.

[42]  I. M. Destler,et al.  Protecting the American Homeland , 2003 .

[43]  Vicki M. Bier,et al.  Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .

[44]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[45]  Gregory Levitin,et al.  Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..

[46]  Shishir Nagaraja,et al.  The Topology of Covert Conflict , 2005, WEIS.