Cyber War Game in Temporal Networks

In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we stu...

Full description

Bibliographic Details
Main Authors: Cho, Jin-Hee, Gao, Jianxi
Format: Online
Language:English
Published: Public Library of Science 2016
Online Access:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4747583/
id pubmed-4747583
recordtype oai_dc
spelling pubmed-47475832016-02-22 Cyber War Game in Temporal Networks Cho, Jin-Hee Gao, Jianxi Research Article In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability. Public Library of Science 2016-02-09 /pmc/articles/PMC4747583/ /pubmed/26859840 http://dx.doi.org/10.1371/journal.pone.0148674 Text en https://creativecommons.org/publicdomain/zero/1.0/ This is an open access article, free of all copyright, and may be freely reproduced, distributed, transmitted, modified, built upon, or otherwise used by anyone for any lawful purpose. The work is made available under the Creative Commons CC0 (https://creativecommons.org/publicdomain/zero/1.0/) public domain dedication.
repository_type Open Access Journal
institution_category Foreign Institution
institution US National Center for Biotechnology Information
building NCBI PubMed
collection Online Access
language English
format Online
author Cho, Jin-Hee
Gao, Jianxi
spellingShingle Cho, Jin-Hee
Gao, Jianxi
Cyber War Game in Temporal Networks
author_facet Cho, Jin-Hee
Gao, Jianxi
author_sort Cho, Jin-Hee
title Cyber War Game in Temporal Networks
title_short Cyber War Game in Temporal Networks
title_full Cyber War Game in Temporal Networks
title_fullStr Cyber War Game in Temporal Networks
title_full_unstemmed Cyber War Game in Temporal Networks
title_sort cyber war game in temporal networks
description In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability.
publisher Public Library of Science
publishDate 2016
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4747583/
_version_ 1613536314939932672