On modeling of adversary behavior and defense for survivability of military MANET applications

In this paper we develop a methodology and report preliminary results for modeling attack/defense behaviors for achieving high survivability of military mobile ad hoc networks (MANETs). Our methodology consists of 3 steps. The first step is to model adversary behavior of capture attackers and inside attackers which can dynamically and adaptively trigger the best attack strategies while avoiding detection and eviction. The second step is to model defense behavior of defenders utilizing intrusion detection and tolerance strategies to reactively and proactively counter dynamic adversary behavior. We leverage game theory to model attack/defense dynamics with the players being the attackers/defenders, the actions being the attack/defense strategies identified, and the payoff for each outcome being related to system survivability. The 3rd and final step is to identify and apply proper solution techniques that can effectively and efficiently analyze attack/defense dynamics as modeled by game theory for guiding the creation of effective defense strategies for assuring high survivability in military MANETs. The end product is a tool that is capable of analyzing a myriad of attacker behaviors and seeing the effectiveness of countering adaptive defense strategies which incorporate attack/defense dynamics.

[1]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[2]  Mihaela van der Schaar,et al.  Intervention with Private Information, Imperfect Monitoring and Costly Communication , 2013, IEEE Transactions on Communications.

[3]  Jin-Hee Cho,et al.  Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.

[4]  Ing-Ray Chen,et al.  Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..

[5]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[6]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[7]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[8]  Sheng-Tzong Cheng,et al.  Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.

[9]  Jia Guo,et al.  Trust management in mobile ad hoc networks for bias minimization and application performance maximization , 2014, Ad Hoc Networks.

[10]  Mrs. A. Sangeetha,et al.  REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING FOR INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS , 2014 .

[11]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[12]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[13]  Ing-Ray Chen,et al.  Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.

[14]  Ing-Ray Chen,et al.  Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..

[15]  Ing-Ray Chen,et al.  On Survivability of Mobile Cyber Physical Systems with Intrusion Detection , 2012, Wireless Personal Communications.

[16]  Jin-Hee Cho,et al.  Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks , 2011, Perform. Evaluation.

[17]  Farokh B. Bastani,et al.  Effect of artificial-intelligence planning-procedures on system reliability , 1991 .

[18]  Ji Wang,et al.  Trust-based data fusion mechanism design in cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.

[19]  Ing-Ray Chen,et al.  Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks , 2015, TOSN.

[20]  Ing-Ray Chen,et al.  Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks , 2011, IEEE Transactions on Mobile Computing.

[21]  Ing-Ray Chen,et al.  Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..

[22]  Ing-Ray Chen,et al.  Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..

[23]  Farokh B. Bastani,et al.  On the Reliability of AI Planning Software in Real-Time Applications , 1995, IEEE Trans. Knowl. Data Eng..

[24]  Ing-Ray Chen,et al.  Analysis of Replicated Data with Repair Dependency , 1996, Comput. J..

[25]  Farokh B. Bastani,et al.  Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).

[26]  Ing-Ray Chen,et al.  Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers , 1998, Perform. Evaluation.

[27]  Guofei Jiang,et al.  Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.

[28]  Ing-Ray Chen,et al.  Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.

[29]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[30]  Ing-Ray Chen,et al.  Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks , 2001, Mob. Networks Appl..

[31]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[32]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[33]  Ing-Ray Chen,et al.  Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..

[34]  Ing-Ray Chen,et al.  Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.

[35]  Ing-Ray Chen,et al.  Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.