2011 3rd International Conference on Computer Research and Development 2011
DOI: 10.1109/iccrd.2011.5764062
|View full text |Cite
|
Sign up to set email alerts
|

Optimal resource allocation for protecting system availability against random cyber attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…An analogy to the use of decoy VMs can be drawn from the chaff cloud spread by a military aircraft, which are made of cheap materials but can effectively fool the enemy's radar and avoid the attack on the aircraft. Although the use of false-target-based defense has also been studied in the related work [22] [23], this paper is the first to study its real use in cloud-based mission-critical computing for survivability.…”
Section: B Decoy Vm Clonesmentioning
confidence: 99%
“…An analogy to the use of decoy VMs can be drawn from the chaff cloud spread by a military aircraft, which are made of cheap materials but can effectively fool the enemy's radar and avoid the attack on the aircraft. Although the use of false-target-based defense has also been studied in the related work [22] [23], this paper is the first to study its real use in cloud-based mission-critical computing for survivability.…”
Section: B Decoy Vm Clonesmentioning
confidence: 99%
“…First, the system models are different. In this paper, the system reliability depends on the reliability of a set of selected voting replicas and whether they are compromised or not, while in (Wang et al, , 2011, the system reliability is the probability that all critical components survive the attacks. Second, the protection approaches are different.…”
Section: Related Workmentioning
confidence: 99%
“…As is evident in Table 8, the value of contest intensity determines the nature of a battle. However, there should be no obvious trend for network compromise probability based on the different values of contest intensity [14][15][16][17]. In other words, the value of contest intensity prefers neither the defender nor the commanders.…”
Section: The Relationship Between Synergy Effectiveness and Contest Imentioning
confidence: 99%
“…This function has been widely used in the literature addressing various economicsrelated activities, as well as international and civil wars [12,13]. In recent years, this theory has also been applied to the determination of the success probability for the attacker to compromise a system [14][15][16][17]. The form of contest success function is as follows:…”
Section: Scenariomentioning
confidence: 99%