Title: Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
1Defending Complex System Against External
ImpactsGregory Levitin (IEC, UESTC)
2Game Theory vs. Reliability
- Risk arises from technology, nature, humans.
- Conventional reliability and risk analysis assume
play against static, fixed and immutable factors
which are exogenously given. - Intentionality plays increasing role (9/11,
terrorists attacks). - Game theory assumes play against adaptable,
strategic, optimizing, dynamic agents.
Need for combining reliability risk analysis
with game theory
3Game
Information
Player 1 action x?X
Player 2 action y?Y
System
Payoff P(x,y)
4 Five Elements of a GameThe
players -how many players are there?
-does nature/chance play a role? A complete
description of what the players can do the set
of all possible actions (strategies). The
information that players have available when
choosing their actions A description of the
payoff consequences for each player for every
possible combination of actions chosen by all
players playing the game. A description of all
players preferences over payoffs
5 System
Attacker
Defender
Expected Damage
Strategies
Strategies
Payoff
Payoff
6Survivable system - system that is able to
complete its mission in a timely manner, even if
significant portions are incapacitated by attack
or accident.
Multi-state system with different performance
rates
Reliability vulnerability analysis
7Multi-state System
Combination of Elements
G
System performance
8Two types of functional damage assessment
Damage proportional to the loss of demand
probability
Damage proportional to the unsupplied demand
D
D
No damage
No damage
Demand
Demand
Damage
Damage
P
P
Production line, Power generator
Bridge, Voltage protection
9Performance redundancy
System without performance redundancy
System with performance redundancy
x
x
Demand
No damage
Demand
Damage
System performance
System performance
Damage
Pr(G?x)
Pr(G?x)
10 System
Attacker
Defender
Expected Damage
Strategies
Strategies
Payoff
Payoff
11System survivability enhancement by element
separation
12Optimal element separation problem
wq
...
v
q
13PARAMETERS OF SYSTEM ELEMENTS
1
8
6
2
9
3
7
4
10
5
14OPTIMAL SEPARATION SOLUTION FOR v0.05
11
15
2
8
6
3
13
9
14
1
7
4
10
12
5
16
15System survivability enhancement by element
protection
16Survivability optimization problem
wqc
vc
...
q
v
17Optimal system structure
18System survivability enhancement by deploying
false targets
Limited resource No information
19Defense strategy
Damage
g
Destruction probability
Protection
v
False targets
Impact probability
p
Disinformation
20 System
Attacker
Defender
Expected Damage
Strategies
Strategies
Payoff
Payoff
21Attacker vs. Disaster
Impact resources Limited
Unlimited
Impact direction Strategic
(optimal)
Random
22Single attack strategy
Perfect knowledge about the system and ability of
impact direction
p1
No knowledge about the system or inability of
impact direction
Imperfect knowledge about the system
p
Spi1
23Multiple attack strategy with different attack
options
24Vulnerability (destruction probability) as
function of actions combination
Set of attackers actions
Set of defenders actions
25Game with unconstrained resources (non-zero sum
game)
Attackers utility
Defenders losses
Losses dr min
Expected damage D
Defense cost r
Attack cost R
Expected damage d
R
r
Utility D-R max
26Human lives vs. defense budget dilemma
Defenders losses
Political decisions
Expected damage
r
Losses
Defense cost
Constrained Problem
r
27Game with constrained resources (zero sum game)
max
D
min
Expected damage D( attackers
resource allocation, R
defenders resource allocation) r
The resources are almost always constrained
(defense budgets etc.)
28 Two period game Defender X D(X,Y(X)) ?
min Attacker Y(X) D(X,Y) ? max
Defender moves first (builds the system over
time) MINMAX
29Simple analytical models
Insight,
General recommendations
Specific solutions
Complex models
30Importance of protections
1
1
4
8
6
6
11
10
9
15
2
2
12
7
5
16
3
13
10
4
8
9
11
7
17
14
5
3
Single attack with perfect knowledge
Single attack with no knowledge
Unlimited multiple attacks
31Example of optimal defense strategies
1
1
4
8
6
6
11
10
9
15
2
2
12
7
5
16
3
13
10
4
8
9
11
3
7
17
14
5
Expected damage
Multiple attacks
Single attack with perfect knowledge
Single attack with no knowledge
Defense budget
32Protection vs. separation
Dgpv
v
g
33Protection vs. Redundancy (separated elements)
VsystvN
v
N
34Redundancy with partial protection
Ddpv
v
v
35Attack on a subset of targets
Dgpv
p
v
p
v
36Protection vs. deployment of false targets Single
element
Dgpv
v
v
p
p
v
37Other topics studied
- Preventive strike vs. defense
- Dynamic (stockpiling) resources
- Intelligence vs. attack strength
- Imperfect false targets
- Double attack strategies
- Protection against attacks and disasters
- Multiple consecutive attacks
38levitin_at_iec.co.illevitin_g_at_yahoo.com
- Additional information
- Further research
- Related papers
- Collaboration