Cyber War Game in Temporal Networks
In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we stu...
Main Authors: | , |
---|---|
Format: | Online |
Language: | English |
Published: |
Public Library of Science
2016
|
Online Access: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4747583/ |
id |
pubmed-4747583 |
---|---|
recordtype |
oai_dc |
spelling |
pubmed-47475832016-02-22 Cyber War Game in Temporal Networks Cho, Jin-Hee Gao, Jianxi Research Article In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability. Public Library of Science 2016-02-09 /pmc/articles/PMC4747583/ /pubmed/26859840 http://dx.doi.org/10.1371/journal.pone.0148674 Text en https://creativecommons.org/publicdomain/zero/1.0/ This is an open access article, free of all copyright, and may be freely reproduced, distributed, transmitted, modified, built upon, or otherwise used by anyone for any lawful purpose. The work is made available under the Creative Commons CC0 (https://creativecommons.org/publicdomain/zero/1.0/) public domain dedication. |
repository_type |
Open Access Journal |
institution_category |
Foreign Institution |
institution |
US National Center for Biotechnology Information |
building |
NCBI PubMed |
collection |
Online Access |
language |
English |
format |
Online |
author |
Cho, Jin-Hee Gao, Jianxi |
spellingShingle |
Cho, Jin-Hee Gao, Jianxi Cyber War Game in Temporal Networks |
author_facet |
Cho, Jin-Hee Gao, Jianxi |
author_sort |
Cho, Jin-Hee |
title |
Cyber War Game in Temporal Networks |
title_short |
Cyber War Game in Temporal Networks |
title_full |
Cyber War Game in Temporal Networks |
title_fullStr |
Cyber War Game in Temporal Networks |
title_full_unstemmed |
Cyber War Game in Temporal Networks |
title_sort |
cyber war game in temporal networks |
description |
In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability. |
publisher |
Public Library of Science |
publishDate |
2016 |
url |
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4747583/ |
_version_ |
1613536314939932672 |