Please use this identifier to cite or link to this item: https://doi.org/10.1016/j.ress.2010.02.008
DC FieldValue
dc.titleDefending simple series and parallel systems with imperfect false targets
dc.contributor.authorPeng, R.
dc.contributor.authorLevitin, G.
dc.contributor.authorXie, M.
dc.contributor.authorNg, S.H.
dc.date.accessioned2014-06-17T06:59:58Z
dc.date.available2014-06-17T06:59:58Z
dc.date.issued2010-06
dc.identifier.citationPeng, R., Levitin, G., Xie, M., Ng, S.H. (2010-06). Defending simple series and parallel systems with imperfect false targets. Reliability Engineering and System Safety 95 (6) : 679-688. ScholarBank@NUS Repository. https://doi.org/10.1016/j.ress.2010.02.008
dc.identifier.issn09518320
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/63086
dc.description.abstractThis paper analyzes the optimal distribution of defense resources between protecting the genuine system elements and deploying imperfect false targets (FTs) in simple series and parallel systems. The FTs are not perfect and the attacker can detect a FT with a non-zero probability. Once the attacker has detected certain number of FTs, it ignores them and chooses such number of undetected targets to attack that maximizes the expected damage to the system. The defender decides how many FTs to deploy in order to minimize the expected damage to the system assuming that the attacker uses the most harmful strategy to attack. The expected damage to a series system is proportional to the probability of system destruction. The expected damage to a parallel system can be defined as proportional to the probability that the demand is not met, or as the amount of the unsupplied demand. The paper demonstrates the methodology of analysis of optimal defense strategy as function of different parameters (number of genuine system elements, contest intensity, total attacker's resource). It presents the decision curves that can be used for the making a decision about efficiency of deploying FTs depending on their cost and detection probability. © 2010 Elsevier Ltd. All rights reserved.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1016/j.ress.2010.02.008
dc.sourceScopus
dc.subjectAttack
dc.subjectDefense
dc.subjectFalse targets
dc.subjectParallel systems
dc.subjectSeries systems
dc.subjectVulnerability
dc.typeArticle
dc.contributor.departmentINDUSTRIAL & SYSTEMS ENGINEERING
dc.description.doi10.1016/j.ress.2010.02.008
dc.description.sourcetitleReliability Engineering and System Safety
dc.description.volume95
dc.description.issue6
dc.description.page679-688
dc.description.codenRESSE
dc.identifier.isiut000277111300010
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.