380 likes | 526 Views
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD) , 2011 3rd Li Wang. Adviser : Frank , Yeong - Sung Lin Present by Jason Chang. Agenda. Introduction Related Work
E N D
Optimal Resource Allocation for Protecting System Availability against Random Cyber AttackInternational Conference Computer Research and Development(ICCRD) , 2011 3rdLi Wang Adviser: Frank , Yeong - Sung Lin Present by Jason Chang
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Introduction • Many distributed system provide service with different level of criticalities , loss of core service often results in catastrophic consequences. • The time duration in which the system is operating is also the time duration in which attacks make their effort to breach the system. • Under limited resources , how to ensure the availability of system core service within that time duration is a challenging issue.
Introduction • For an attacker , the time to compromise a system component depends on the component’s vulnerabilities and the attacker skill level. • Therefore , in order to increase system availability , it is advisable to: • extend the time needed by the attacker to compromise the component • decrease the probability that critical core components are attacked
Introduction • In general , there are three commonly used approached to improve system availability: • component protection enhancement prevent the attacker from exploiting component’s vulnerabilities and detect external attacks in early stage • creation of redundant components the total time needed to compromise the system is prolonged • introducing camouflage of components decrease the probability that genuine components being attacked
Introduction • Our current work is based on the assumption that some type of technology , such as the one proposed by Wang et. al.[28] , is used and attackers only execute random attack strategy. • In particular , we consider a situation where the defender is allowed to apply the three approaches mentioned before to protect a distributed system but with only limited resources. • We formulate this attacker-defender problem as a defender’s optimization problem and present an algorithm to optimally distribute resources so as to obtain maximum system availability.
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Related Work • Differs from other referenced papers in two aspects: • attacker’s model given a fixed amount of time to compromise the system • defender’s model consider a combination of protection approaches that require system configuration change and that do not require system configuration change
Related Work • Differs from Levitin’s work from three aspects: • The system models are different • The attacker has no idea about the defender’s resource • The probability to compromise a component depends on the attack-time units and component protection status
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
System Model and Assumptions • We assume that: • The criticality of system services varies , and the components which are to provide critical services are called core components. • Service will not be maintained if its components fails. • Failure of any core service results in system failure. • Only one defensive approach can be applied to a component. • Components are independent of each other. • Attacker uses random attack strategy and can only attack one component at each time unit.
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Problem Formulation • The distributed system is originally composed of n components which are denoted as 。 • Defender’s resource R is distributed among camouflaged components(nf), protected components(np) , and the creation of r redundant components for each redundant components(nr). • The total number of components on which the redundancy approach or protection approach are applied should be no more than the total number of core components.
Problem Formulation • We can formulate the attacker-defender problem using the balls-and-bins model. • The number of balls in a specific bin follows the Poisson Distribution. • The probability that a component will be attacked k time units is : where Yirefers to the attack-time unit on a specific component Xi, and
Problem Formulation • As component failures are assumed to be independent of each other , the system availability can be represented as: where represents the probability that components Xi is operational
Problem Formulation • As protected components require more than t1attack-time units to be compromised , the probability that the protected component is operational is : • When a redundancy approach is applied to the component , there will be components in total . Therefore , the probability that the composite component is operational is:
Problem Formulation • In addition , when the component is neither protected nor replicated , its probability of being operational is:
Problem Formulation • There are np components under protection and nrcomponents have redundant components. Thus , no defensive approach is applied on core components. • Therefore , the availability of system is:
Problem Formulation • According to the Poisson Distribution: • Therefore , we have: where and
Problem Formulation • The defender’s total resources are R , and . Moreover , np , nr , and nfmust be a non-negative integer. • Thus , the attacker-defender problem is a nonlinear integer programming problem in essence , and it can be expressed as:
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Determine the Optimal Solution • The optimal defensive strategy is to choose np , nr , and nf that maximizes the system availability. • Moreover , based on Equation 9 , we know that the system availability function is nonlinear , nonseparable , and nonconvex. • In [4] , Chern proved that the reliability redundancy optimization problem , even in a series system with two constraints , are NP-hard.
Determine the Optimal Solution • Existing methods for solving nonlinear integer programming problems are mainly separated into three categories: • heuristic greatly decrease the computational complexity • approximations performance depends on the system structure • global optimization methods guarantee the optimal solution , but the complexity is relatively high
Determine the Optimal Solution • Global optimization methods: • Dynamic programming not applicable to nonseparableproblem nor suitable for problem with more than two constraints • Branch-and-bound are used to solve problems with a large search space,but the effectiveness of a branch-and-bound procedure relies on the sharpness of the bound • Implicit enumeration very suitable for problems of small scale and with few variants
Determine the Optimal Solution • Ex: • R=600 , D=100 , cf=20 , cr=50 , cp=30 , t1=5 , t0=3 , n=30 , m=10 r=1 • Result: • Maximum system availability is 0.77 where nf=15 , nr=0 , np=10
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Experimentation • Experiment 1:the available resources are not fixed
Experimentation • Available resource is low. • Available resource increase. • Available resource reaches 1000
Experimentation • Experiment 2:the total attack time units are not fixed • Total attack time is under 60. • Total attack time is over 70.
Experimentation • Experiment 3:the amount of core components begin with 1 and increase by 2 in the next round. • Core components is less than 13. • Core components is between15 and 19. • Core components exceeds 21.
Agenda • Introduction • Related Work • System Model and Assumptions • Problem Formulation • Determine the Optimal Solution • Experimentation • Conclusion
Conclusion • Three sets of experiments are performed to investigate the relationship between: • available resources and system availability , resources and resources allocations strategies • attack time and resources allocation strategies • resource allocation strategies and the number of core components
Conclusion • In this paper , we did not consider the cost the attacker accrues when attacking different components in the next time unit. • If take into consideration , the optimal problem may be view from two different perspectives: • attacker’s perspective how frequently to switch to another component • defender’s perspective analyze the attacker’s strategy , and take countermeasures to minimize the system damage