Please use this identifier to cite or link to this item:
https://doi.org/10.1016/j.ress.2010.02.008
DC Field | Value | |
---|---|---|
dc.title | Defending simple series and parallel systems with imperfect false targets | |
dc.contributor.author | Peng, R. | |
dc.contributor.author | Levitin, G. | |
dc.contributor.author | Xie, M. | |
dc.contributor.author | Ng, S.H. | |
dc.date.accessioned | 2014-06-17T06:59:58Z | |
dc.date.available | 2014-06-17T06:59:58Z | |
dc.date.issued | 2010-06 | |
dc.identifier.citation | Peng, R., Levitin, G., Xie, M., Ng, S.H. (2010-06). Defending simple series and parallel systems with imperfect false targets. Reliability Engineering and System Safety 95 (6) : 679-688. ScholarBank@NUS Repository. https://doi.org/10.1016/j.ress.2010.02.008 | |
dc.identifier.issn | 09518320 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/63086 | |
dc.description.abstract | This paper analyzes the optimal distribution of defense resources between protecting the genuine system elements and deploying imperfect false targets (FTs) in simple series and parallel systems. The FTs are not perfect and the attacker can detect a FT with a non-zero probability. Once the attacker has detected certain number of FTs, it ignores them and chooses such number of undetected targets to attack that maximizes the expected damage to the system. The defender decides how many FTs to deploy in order to minimize the expected damage to the system assuming that the attacker uses the most harmful strategy to attack. The expected damage to a series system is proportional to the probability of system destruction. The expected damage to a parallel system can be defined as proportional to the probability that the demand is not met, or as the amount of the unsupplied demand. The paper demonstrates the methodology of analysis of optimal defense strategy as function of different parameters (number of genuine system elements, contest intensity, total attacker's resource). It presents the decision curves that can be used for the making a decision about efficiency of deploying FTs depending on their cost and detection probability. © 2010 Elsevier Ltd. All rights reserved. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1016/j.ress.2010.02.008 | |
dc.source | Scopus | |
dc.subject | Attack | |
dc.subject | Defense | |
dc.subject | False targets | |
dc.subject | Parallel systems | |
dc.subject | Series systems | |
dc.subject | Vulnerability | |
dc.type | Article | |
dc.contributor.department | INDUSTRIAL & SYSTEMS ENGINEERING | |
dc.description.doi | 10.1016/j.ress.2010.02.008 | |
dc.description.sourcetitle | Reliability Engineering and System Safety | |
dc.description.volume | 95 | |
dc.description.issue | 6 | |
dc.description.page | 679-688 | |
dc.description.coden | RESSE | |
dc.identifier.isiut | 000277111300010 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.