76
Resource Distribution in Multiple Attacks Against a Single Target Author: Gregory Levitin ,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010

Resource Distribution in Multiple Attacks Against a Single Target

  • Upload
    forbes

  • View
    21

  • Download
    0

Embed Size (px)

DESCRIPTION

Resource Distribution in Multiple Attacks Against a Single Target. Author: Gregory Levitin ,Kjell Hausken Risk Analysis, Vol. 30, No. 8, 2010. Agenda. Introduction & Background Problem Description (Goal) The model Assumption Target vulnerability(V) Expenditure(E) Resource Distribution - PowerPoint PPT Presentation

Citation preview

Page 1: Resource Distribution in Multiple Attacks Against a Single Target

Resource Distribution in Multiple Attacks Against a Single Target

Author: Gregory Levitin ,Kjell HauskenRisk Analysis, Vol. 30, No. 8, 2010

Page 2: Resource Distribution in Multiple Attacks Against a Single Target

Agenda

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 3: Resource Distribution in Multiple Attacks Against a Single Target

Introduction & Background

• It has been common to consider a nonstrategic attacker , either by assuming a fixed attack or a fixed attack probability.

• Bier et al. (1) assume that a defender allocatesdefense to a collection of locations while an attacker chooses a location to attack.

Page 4: Resource Distribution in Multiple Attacks Against a Single Target

Introduction & Background

• In this article, we consider a target (object) that a defender seeks to protect and an attacker seeks to destroy through multiple sequential attacks.

• The defender tries to keep the object undestroyed in each attack launched by the attacker.The phenomenon is modeled as a contest between a defender and an attacker.

Page 5: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 6: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

• Basic definitions:–Vulnerability:

Probability of target destruction by the attacker.

– Effort:Amount of intentional force aimed at destruction or protection of a system element (in this article, it is measured as the amount of attacker’s resource allocated to each attack and amount of defender’s resource allocated to defense)

Page 7: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

• 1. Whether the attacker should allocate its entire resource into one large attack or distribute it among several attacks.

Page 8: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

• 1. Whether the attacker should allocate its entire resource into one large attack or distribute it among several attacks.

Attack strategy

One large attack

Several attacks

Page 9: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

Page 10: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

Attack strategy

One large attack

Several attacks

Even Resource Distribution

Geometric Resource

Distribution

Page 11: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

• 2.Whether geometrically increasing or decreasing resource distribution into a fixed number of sequential attacks is more beneficial than equal resource distribution

Attack strategy

One large attack

Several attacks

Even Resource Distribution

Geometric Resource

Distribution

Geometrically increasing

Geometrically decreasing

Page 12: Resource Distribution in Multiple Attacks Against a Single Target

Problem Description

• 3.How the optimal attack strategy depends on the contest intensity(m).

• Two objectives:– 1.To maximize the target vulnerability(V).– 2.To minimize the expected attacker resource expenditure(E).

Page 13: Resource Distribution in Multiple Attacks Against a Single Target

Optimal attack straregy

Problem Description

• 3.How the optimal attack strategy depends on the contest intensity(m).

Attack strategy

One large attack

Several attacks

Even Resource Distribution

Geometric Resource

Distribution

Geometrically increasing

Geometrically decreasing

Page 14: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 15: Resource Distribution in Multiple Attacks Against a Single Target

The model- Assumption• Assumption:– (1) We consider a target (single target) that a defender

seeks to protect and an attacker seeks to destroy through multiple sequential attacks.

– (2)Both the defender and the attacker have limited resources.

– (3)The attacker can observe the outcome of each attack and stop the sequence of attacks when the target is destroyed.

– (4)The attacker distributes its resource over time.

Page 16: Resource Distribution in Multiple Attacks Against a Single Target

The model- Assumption

• Assumption:– (5)We model the common case that the protection is

static and cannot be changed over time.• Target is destroyed->The protection is destroyed.• Target is not destroyed->the protection remains in place also

for the subsequent attack.

– (6) We assume that the defender uses the same protection during the series of K attacks and allocatesits entire resource into this protection.

Page 17: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 18: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• For any single attack, the vulnerability of atarget is determined by a contest between the defender exerting effort t and the attacker exerting effort T in this attack.

->Contest success function

Page 19: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• Contest success function

:The attack success probability.

T :Attacker’s effort to attack a target.

t :Defender’s effort to protect a target.

m: Attacker-defender contest intensity.

Page 20: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• Contest success function

• Two factors influence the :

– 1.The relation between the resources(t/T) in each attack.

– 2.Contest intensity m .

Page 21: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• 1.The relation between the resources(t/T) in each attack.

– If the attacker exerts high effort(T>t), it is likely to win the contest that gives high vulnerability.

– If the defender exerts high effort(T<t), it is likely to win the contest that gives low vulnerability.

Page 22: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• 2.Contest intensity m :Measures whether the agents’ efforts have low or high impact on the target vulnerability

Page 23: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• According to assumption (6), We assume that the defender uses the same protection during the series of K attacks and allocates its entire resource into this protection:

t=r• NOMENCLATURE

t :Defender’s effort to protect a targetr :Defender’s resource

Page 24: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• On the contrary, the attacker distributes its entire resource R among K attacks such that the resource allocated to attack

• NOMENCLATURE R :Attacker’s resource

:Attacker’s effort (resource used) in the th attack K :Number of consecutive attacks

Page 25: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• The success probability of the th attack according to Contest success function is:

• The probability that the target survives in th attacks is:

Page 26: Resource Distribution in Multiple Attacks Against a Single Target

Target vulnerability(V)

• The probability that the target survives all K attacks is:

• Thus, the target vulnerability in K attacks is:

Page 27: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

• According to assumption (3), The attacker can observe the outcome of each attack and stop the sequence of attacks when the target is destroyed.

• If the target is destroyed in the attack, the attacker spends the resource:

Page 28: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

• NOMENCLATURET : attacker’s effort (resource used) in the attack(for even resource distribution T ≡ T)

• If the probability that the target is destroyed in the th attack is ,the expected attacker’s resource expenditure can be obtained as:

Page 29: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

If the target is destroyed in the th attack , the resource attacker spends .

Page 30: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

The expected attacker’s resource expenditure when target is destroyed .

Page 31: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

The probability that the target survives all K attacks.

Page 32: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

The expected attacker’s resource expenditure when after K attacks the attacker fails to destroy the target.

Page 33: Resource Distribution in Multiple Attacks Against a Single Target

Expenditure(E)

• The expected attacker’s resource expenditure can be obtained as:

• We will present the expected resource expenditure as a fraction of the total of attacker’s resource(R):

Page 34: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 35: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• The attacker can choose the number of attacks K and distribute its resource evenly among the attacks such that T = R/K and the probability of target destruction in any attack is:

=K/R *r = 1/T *r=r/T

Page 36: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• The target vulnerability is:

Even resource distribution ->1- are equal in all K attacks,so

Page 37: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• Parameter values exist where the derivative in Equation (6) is negative, but it is often positive.

Page 38: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• Example:– Negative:

(m = 2, R = r)

1 2 3 4 5 6 7 8 9 10 110

0.1

0.2

0.3

0.4

0.5

0.6

m=2,R=r

K

v

Page 39: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• Example:– Positive: (m = 0 ; m=1,R=r )

1 2 3 4 5 6 7 8 9 100

0.2

0.4

0.6

0.8

1

1.2

m=0

K

V

1 2 3 4 5 6 7 8 9 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

m=1 ,R=r

K

V

Page 40: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• m = 0 ,V increases concavely from 0 to 1 as a function of K and the attacker benefits from unlimitedly increasing the number of attacks.

• In realistic situations, the number of attacks is limited by time constraints by limited minimal cost of a single attack, etc. Therefore, the upper limit of K always exists.

Page 41: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• Fig. 1 presents the target vulnerability as a function of the contest intensity m for different K and r/R.

Page 42: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-V

• It can be seen that the smaller the contest intensity(m), the more beneficial it is to increase the number of attacks.

Page 43: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-E

• If the target is destroyed in the th attack, the probability of this event is:

The probability that the target survives in all -1 attacks.

The probability that the target is destroyed.

Page 44: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-E

• The attacker spends the resource T =R/K* .

* T

Page 45: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-E

R/K* R*

R/T* *

Page 46: Resource Distribution in Multiple Attacks Against a Single Target

Even Resource Distribution-E

• Fig. 2 presents the expected attacker’s resource expenditure as a function of the contest intensity m for different r/R.

Page 47: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 48: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

• Now we assume that the attacker can change the amount of resources allocated to each of the K attacks.

• To model the resource distribution, we use the geometric progression since it is simple and flexible.

Page 49: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

• Assume that the attacker allocates effort to the first attack and changes the effort according to the geometric progression.

Page 50: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

• The parameter q(Attack effort variation factor) determines the strategy of effort variation through the K sequential attacks:

Page 51: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

Attack strategy

One large attack

q=0

Several attacks

Even Resource

Distributionq=1

Geometric Resource

Distribution

Geometrically increasing

q>1

Geometrically decreasing

q<1

Page 52: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

• For the given resource R and effort variation parameter q, we obtain:

Page 53: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

• We obtain the probability of success in the th attack as:

Page 54: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-V

• The total system vulnerability in K sequential attacks with effort variation parameter q is:

Page 55: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-E

• The probability that the target is destroyed in the th attack is:

• Thus, the expected resource expenditure is:

Page 56: Resource Distribution in Multiple Attacks Against a Single Target

Geometric Resource Distribution-E

• Fig. 3 illustrates how maximum target vulnerability and minimum resource expenditure can be competing attacker objectives.

Page 57: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 58: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations

• For low contest intensity m = 0.5– Maximal V:

q=1 (Even distribution)V=0.842E=0.545

– Minimal E:q=1.79E=0.47

V=0.8175

Page 59: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations

• For high contest intensity m = 2– Maximal V:

q=0 (Single attack)V=0.5E=1

– Minimal E:q=0.47E=0.8855

V=0.2875

Page 60: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations• Using numerical simulations to demonstrate the

methodology of model analysis.

• Fig. 4 presents the values of q and K that maximize V and the values of q and K that minimize E and the corresponding values of V

and E as functions of m for different values of the ratio r/R and K is allowed to vary from 1 to 10.

• There is a reasonable upper limit of K, which we here set to 10.

Page 61: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Maximal V

r/R=0.5 r/R=1 r/R=2

Page 62: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Maximal V

r/R=0.5m 1 = 1.08

The optimal number of attacks ismaximal for m < m 1

Page 63: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Maximal V

For m> m2, the single attack with K = 1 and q = 0 becomes preferable for the attacker.

m 2 = 1.6

Page 64: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Maximal V

r/R=0.5

r/R=1 r/R=2

Page 65: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Maximal V• The optimal number of attacks is maximal for m < m 1

(where for r/R = 0.5 m 1 = 1.08, for r/R = 1 m 1 = 1.04, and for r/R = 2 m 1 = 1.02).

• Then it drops gradually and for m < m 2 (where for r/R = 0.5 m 2 = 1.6, for r/R = 1 m 2 = 1.28, and for r/R = 2 m 2 = 1.16) the single attack with K = 1 and q = 0 becomes preferable for the attacker.

• The values of q between 1 and 0 are never optimal when the system vulnerability is maximized.

Page 66: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Minimal E

r/R=0.5 r/R=1 r/R=2

Page 67: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Minimal E

• For low contest intensities the attack effort should increase through the K attacks (q > 1), whereas for more intensive contests it should decrease (q < 1).

Page 68: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal

r/R=0.5 r/R=1 r/R=2

Page 69: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal

• The attacker needs to strike a V versus E balance (tradeoff) for the attack strategy.

• Fig. 5 presents the differences in V and E obtained for strategies maximizing V and minimizing E.

Page 70: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal

Page 71: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal

• For m = 0.3(Low intensity), E can be reduced by 51.4% by the price of a 1.6% decrease of V.

Move from 0.3->1

Page 72: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal

• On the contrary, when m = 3(High intensity) ,E can be reduced by only by 7.74%, which causes 49% decrease of V.

Move from3->1

Page 73: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal• When the contest intensity is low, a great

reduction of E without significant sacrifice of V is possible.

• Highly intensive contests even a small reduction of E causes a drastic reduction of V.

• The benefit of choosing the minE strategy forsmall m increases with the growth of the attacker’s resource superiority (decrease of r/R).

Page 74: Resource Distribution in Multiple Attacks Against a Single Target

Numerical simulations-Optimal

Page 75: Resource Distribution in Multiple Attacks Against a Single Target

• Introduction & Background• Problem Description (Goal)• The model

• Assumption• Target vulnerability(V)• Expenditure(E)

• Resource Distribution• Even Resource Distribution(V,E)• Geometric Resource Distribution(V,E)

• Numerical simulations• Conclusion

Page 76: Resource Distribution in Multiple Attacks Against a Single Target

Conclusion

• When the contest intensity is low, the attacker benefits from distributing its resource among several attacks and attacking the target with an effort that increases for each subsequent attack.

• For highly intensive contests, concentrating the entire attacker’s effort in one single attack ispreferable.