Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

2012 
How to apply timely and effective defense strategies against attackers while maximizing system survivability is a critical issue for a defender. This paper mathematically models attack and defense scenarios, using various defensive mechanisms during both the planning and defending stages and under quality of service constraints. This model incorporates high degrees of randomness, as attackers are assumed to have incomplete information. Given such non-deterministic problems, this paper identifies the appropriate time for applying defense in depth or resource concentration strategy.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    15
    References
    1
    Citations
    NaN
    KQI
    []