Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)

Slides:



Advertisements
Similar presentations
Game Theory. I What is Game theory? The Theory of Games and Economic Behaviour by John von Neumann and Oskar Morgenstern (1944). Especially one institution:
Advertisements

The Basics of Game Theory
Chapter 17: Making Complex Decisions April 1, 2004.
Introduction to Game Theory
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
An Introduction to... Evolutionary Game Theory
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Game-Theoretic Approaches to Critical Infrastructure Protection Workshop on Statistics and Counterterrorism November 20, 2004 Vicki Bier University of.
10/19/2004TCSS435A Isabelle Bichindaritz1 Game and Tree Searching.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Economics 202: Intermediate Microeconomic Theory 1.HW #6 on website. Due Thursday. 2.No new reading for Thursday, should be done with Ch 8, up to page.
1 CRP 834: Decision Analysis Week Five Notes. 2 Review Game Theory –Game w/ Mixed Strategies Graphic Method Linear Programming –Games In an Extensive.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Slide 1 of 13 So... What’s Game Theory? Game theory refers to a branch of applied math that deals with the strategic interactions between various ‘agents’,
A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes, “You can’t outrun a bear,” scoffs the camper. His.
Basics on Game Theory For Industrial Economics (According to Shy’s Plan)
Dressing of financial correlations due to porfolio optimization and multi-assets minority games Palermo, Venerdi 18 giugno 2004 Unità di Trieste: G. Bianconi,
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
1 Introduction APEC 8205: Applied Game Theory. 2 Objectives Distinguishing Characteristics of a Game Common Elements of a Game Distinction Between Cooperative.
Games as Systems Administrative Stuff Exercise today Meet at Erik Stemme
Artificial Intelligence for Games and Puzzles1 Games in the real world Many real-world situations and problems.
Ensuring Non-Functional Properties. What Is an NFP?  A software system’s non-functional property (NFP) is a constraint on the manner in which the system.
Unintentional vs. intentional impacts No impact strategy Attacker’s strategy maximizing the expected damage.
UNIT II: The Basic Theory Zero-sum Games Nonzero-sum Games Nash Equilibrium: Properties and Problems Bargaining Games Bargaining and Negotiation Review.
Introduction to Game Theory Yale Braunstein Spring 2007.
Artificial Intelligence for Games and Puzzles1 Games in the real world Many real-world situations and.
Game Theory and Risk Analysis for Counterterrorism
Optimal Survivability Enhancement in Complex Vulnerable systems Gregory Levitin The Israel Electric Corporation Ltd.
UNIT II: The Basic Theory Zero-sum Games Nonzero-sum Games Nash Equilibrium: Properties and Problems Bargaining Games Bargaining and Negotiation Review.
Commitment without Regrets: Online Learning in Stackelberg Security Games Nika Haghtalab Carnegie Mellon University Joint work with Maria-Florina Balcan,
Strategic Game Theory for Managers. Explain What is the Game Theory Explain the Basic Elements of a Game Explain the Importance of Game Theory Explain.
MBAD/F 619: Risk Analysis and Financial Modeling Instructor: Linda Leon Fall 2014
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
Rachid Guerraoui, EPFL. What is a good recommendation system? Recommendation systems are good.
A Learning-Based Approach to Reactive Security * Ben Rubinstein Microsoft Research Silicon Valley With: Adam Barth 1, Mukund Sundararajan 2, John Mitchell.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Introduction to Artificial Intelligence CS 438 Spring 2008 Today –AIMA, Ch. 6 –Adversarial Search Thursday –AIMA, Ch. 6 –More Adversarial Search The “Luke.
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan 2011/3/281.
Protection vs. false targets in series systems Reliability Engineering and System Safety(2009) Kjell Hausken, Gregory Levitin Advisor: Frank,Yeong-Sung.
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
Advanced Decision Architectures Collaborative Technology Alliance An Interactive Decision Support Architecture for Visualizing Robust Solutions in High-Risk.
Adviser: Frank, Yeong - Sung Lin Present by Jason Chang 1.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Adversarial Search Chapter Games vs. search problems "Unpredictable" opponent  specifying a move for every possible opponent reply Time limits.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy Benjamin B.M. Shao IEEE Transaction on Dependable Secure.
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
Strategic Game Theory for Managers. Explain What is the Game Theory Explain the Basic Elements of a Game Explain the Importance of Game Theory Explain.
Alpcan, T., and T. Basar (2004) “A game theoretic analysis of intrusion detection in access control systems” Proceedings of 43 rd IEEE Conference on Decision.
Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010.
Slide 1/20 Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids Paul Wood, Saurabh Bagchi Purdue University
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷 1.  1.Introduction  2.The attack model 2.1. Even resource distribution between two attacks 2.2. Uneven resource.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Econ 805 Advanced Micro Theory 1 Dan Quint Fall 2009 Lecture 1 A Quick Review of Game Theory and, in particular, Bayesian Games.
Optimal Network Protection Against Diverse Interdictor Strategies Jose E. Ramirez-Marquez, Claudio M. Rocco, Gregory Levitin Advisor : Professor Frank.
1 KSCO 2002, Toulouse, April 23-24, 2002 Model Predictive Risk Control Jan Jelinek Model Predictive Risk Control of Military Operations.
Chapter 5 Adversarial Search. 5.1 Games Why Study Game Playing? Games allow us to experiment with easier versions of real-world situations Hostile agents.
O PTIMAL R EPLACEMENT AND P ROTECTION S TRATEGY FOR P ARALLEL S YSTEMS R UI P ENG, G REGORY L EVITIN, M IN X IE AND S ZU H UI N G Adviser: Frank, Yeong-Sung.
S URVIVABILITY OF SYSTEMS UNDER MULTIPLE FACTOR IMPACT E DWARD K ORCZAK, G REGORY L EVITIN Adviser: Frank,Yeong-Sung Lin Present by Sean Chou 1.
How Much and On What? Defending and Deterring Strategic Attackers
PENGANTAR INTELIJENSIA BUATAN (64A614)
Announcements Homework 3 due today (grace period through Friday)
Multiagent Systems Game Theory © Manfred Huber 2018.
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Adviser: Frank,Yeong-Sung Lin Present by 瀅如
Advisor: Frank,Yeong-Sung Lin 碩一 冠廷
Optimal defence of single object with imperfect false targets
Presentation transcript:

Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)

Game Theory vs. Reliability Risk arises from technology, nature, humans. Conventional reliability and risk analysis assume play against static, fixed and immutable factors which are exogenously given. Intentionality plays increasing role (9/11, terrorists’ attacks). Game theory assumes play against adaptable, strategic, optimizing, dynamic agents. Need for combining reliability & risk analysis with game theory

System Game Player 1 action x  X Player 2 action y  Y Payoff: P(x,y) Information

Five Elements of a Game: The players -how many players are there? -does nature/chance play a role? *A complete description of what the players can do – the set of all possible actions (strategies). *The information that players have available when choosing their actions *A description of the payoff consequences for each player for every possible combination of actions chosen by all players playing the game. *A description of all players’ preferences over payoffs

AttackerDefender System Strategies Expected Damage Payoff

Survivable system - system that is able to “complete its mission in a timely manner, even if significant portions are incapacitated by attack or accident”. Multi-state system with different performance rates Reliability + vulnerability analysis w Pr{w>W*} W* S(W*)

Multi-state System Combination of Element s G System performance

Damage proportional to the loss of demand probability Demand Damage Two types of functional damage assessment No damage Damage proportional to the unsupplied demand Demand Damage No damage Production line, Power generator Bridge, Voltage protection P D P D

System without performance redundancy Demand System performance Damage System with performance redundancy Demand System performance Damage Performance redundancy No damage x x Pr(G  x)

AttackerDefender System Strategies Expected Damage Payoff

System survivability enhancement by element separation

... Optimal element separation problem

PARAMETERS OF SYSTEM ELEMENTS

OPTIMAL SEPARATION SOLUTION FOR v=0.05

System survivability enhancement by element protection

... Survivability optimization problem

Functional scheme of system Desired system performance and survivability W, S* Survivability and cost of possible protections List of available elements with given performance distributions List of chosen elements Separation and protection of elements Optimal system structure

System survivability enhancement by deploying false targets Limited resource No information

Defense strategy Damage Separation Protection Destruction probability False targets Impact probability Disinformation p g v

AttackerDefender System Strategies Expected Damage Payoff

Attacker vs. Disaster Impact resources Limited Unlimited Impact direction Strategic (optimal) Random

Single attack strategy p=1/N p=1 p Imperfect knowledge about the system pp  p i =1 No knowledge about the system or inability of impact direction Perfect knowledge about the system and ability of impact direction

Multiple attack strategy with different attack options

Set of attacker’s actionsSet of defender’s actions Vulnerability (destruction probability) as function of actions’ combination

Expected damage: D Utility: D-R max Attack cost: R Expected damage: d Losses: d+r min Defense cost: r Game with unconstrained resources (non-zero sum game) Rr

Expected damage Losses Defense cost Human lives vs. defense budget dilemma r r Political decisions Constrained Problem

Expected damage: D( attacker’s resource allocation, R defender’s resource allocation) r Game with constrained resources (zero sum game) D The resources are almost always constrained (defense budgets etc.) max min

Two period game Defender X: D(X,Y(X))  min Attacker Y(X): D(X,Y)  max Defender moves first (builds the system over time) MINMAX MINMAX:

Simple analytical models Insight, General recommendations Complex models Specific solutions R1R1 R2R2 R3R3 R4R4 R5R5 R7R7 R6R6

Importance of protections Single attack with perfect knowledge Single attack with no knowledge Unlimited multiple attacks

Example of optimal defense strategies Single attack with perfect knowledge Single attack with no knowledge Multiple attacks Defense budget Expected damage

Protection vs. separation = = D=gpv g v

Protection vs. Redundancy (separated elements) = = v V syst =v N N

Redundancy with partial protection = = D=dpv v v

Attack on a subset of targets D=gpv pv pv

Protection vs. deployment of false targets Single element D=gpv v p vp v

Other topics studied Preventive strike vs. defense Dynamic (stockpiling) resources Intelligence vs. attack strength Imperfect false targets Double attack strategies Protection against attacks and disasters Multiple consecutive attacks

Additional information Further research Related papers Collaboration