語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Strategic Security and Recovery on I...
~
University of California, Davis.
Strategic Security and Recovery on Interdependent Networks.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Strategic Security and Recovery on Interdependent Networks./
作者:
Smith, Andrew Michael.
面頁冊數:
1 online resource (132 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Contained By:
Dissertation Abstracts International79-10B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780355969818
Strategic Security and Recovery on Interdependent Networks.
Smith, Andrew Michael.
Strategic Security and Recovery on Interdependent Networks.
- 1 online resource (132 pages)
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Thesis (Ph.D.)--University of California, Davis, 2018.
Includes bibliographical references
Modeling critical systems as networks has given rise to many insights about how to prioritize resource allocation for security (for preventing compromise or large-scale disaster events) and recovery in the rare, yet high-consequence, occurrence of catastrophic failure. Topological graph metrics such as betweenness centrality and clustering coefficient have been shown to approximate critical nodes in cascading failure and recovery scenarios on isolated networks. Most complex networks, however, do not exist in isolation, and often have noncooperative actors controlling interdependent subnetworks. This property motivates studying the impact of strategic interactions on networks representative of critical systems. In this dissertation, we examine strategic scenarios of security and recovery on interdependent networks, primarily applying tools from game theory and optimization.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355969818Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Strategic Security and Recovery on Interdependent Networks.
LDR
:04987ntm a2200361Ki 4500
001
919154
005
20181116131021.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355969818
035
$a
(MiAaPQ)AAI10749164
035
$a
(MiAaPQ)ucdavis:17729
035
$a
AAI10749164
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Smith, Andrew Michael.
$3
1193662
245
1 0
$a
Strategic Security and Recovery on Interdependent Networks.
264
0
$c
2018
300
$a
1 online resource (132 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
500
$a
Adviser: Raissa M. D'Souza.
502
$a
Thesis (Ph.D.)--University of California, Davis, 2018.
504
$a
Includes bibliographical references
520
$a
Modeling critical systems as networks has given rise to many insights about how to prioritize resource allocation for security (for preventing compromise or large-scale disaster events) and recovery in the rare, yet high-consequence, occurrence of catastrophic failure. Topological graph metrics such as betweenness centrality and clustering coefficient have been shown to approximate critical nodes in cascading failure and recovery scenarios on isolated networks. Most complex networks, however, do not exist in isolation, and often have noncooperative actors controlling interdependent subnetworks. This property motivates studying the impact of strategic interactions on networks representative of critical systems. In this dissertation, we examine strategic scenarios of security and recovery on interdependent networks, primarily applying tools from game theory and optimization.
520
$a
We first investigate security on general interdependent networks, modelling the strategic interaction between defenders, who must protect potential targets in their subnetwork, and an attacker, who wishes to compromise the network, as a Stackelberg (leader-follower) game. Failure cascade models are used to describe the spread of attacks between nodes and, consequently, defenders. We extend traditional models of Stackelberg security games to support equilibria computation for multiple defenders. Since computing such equilibria is intractable for many large networks, we develop a heuristic using distributed optimization and a variant of iterated best response. Finally, we analyze equilibrium results on popular synthetic topologies and those found in real-world power grids, and compare the resulting strategies with common graph metrics for assessing security.
520
$a
We then apply concepts from the above security framework to digital systems analysis in order to prioritize critical logic nodes in hardware designs for deeper analysis. To calculate probability of failure cascade in logic networks, we use a novel Fourier decomposition method to characterize how single bit failures in the input of a Boolean function affect the correctness of the output. This method is shown to apply to arbitrary distributions of Boolean functions, as well as categorize a Boolean network into either quiescent (dampens out bit flips on average) or chaotic (exponentially spreads the failure throughout the network). Equilibrium strategies from single defender Stackelberg security games are then used to provide a prioritization of critical nodes in academic testbench digital designs.
520
$a
Finally, we explore decentralization of recovery on interdependent networks. Since computation time is so critical in disaster recovery scenarios, we analyze several game theoretic models for both the the quality of the solution, with respect to the corresponding centralized optimum, as well as time complexity for finding the Nash equilibrium. We then compare an iterated best response heuristic, and prove ?-Nash bounds on approximate solutions. Our model is run on several real-world interdependent utility networks, and results illustrate the tradeoff between slowly computing optimal recovery strategies and quickly computing near optimal strategies; network operators can use such tradeoff points to determine which model is more appropriate for a given scenario. Diving deeper into the recovery process, we also develop a percolation model to mimic the giant component formation and commodity deficit cost satisfaction of the centralized optimization process. We analyze this model on complete and synthetic networks, and discover the component formation and recovery cost curves closely resemble results from the more computationally intensive optimization method.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of California, Davis.
$b
Computer Science.
$3
1182372
773
0
$t
Dissertation Abstracts International
$g
79-10B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10749164
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入