The Complexity of the Infinity Replacement Problem in the Cyber Security Model

© 2017 IEEE. In this article we present a new defensive problem on a security system. Let M be a security model (T, C, P), where T = (V, E) is a rooted tree rooted at r, C is a multiset of E(T) costs and P is a multiset of V(T)-1 prizes and let (T, c, p) be a security system, where c and p are bijec...

Full description

Saved in:
Bibliographic Details
Main Authors: Supachai Mukdasanit, Sanpawat Kantabutra
Format: Conference Proceeding
Published: 2018
Subjects:
Online Access:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053450546&origin=inward
http://cmuir.cmu.ac.th/jspui/handle/6653943832/62655
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Chiang Mai University
id th-cmuir.6653943832-62655
record_format dspace
spelling th-cmuir.6653943832-626552018-11-29T07:38:12Z The Complexity of the Infinity Replacement Problem in the Cyber Security Model Supachai Mukdasanit Sanpawat Kantabutra Computer Science © 2017 IEEE. In this article we present a new defensive problem on a security system. Let M be a security model (T, C, P), where T = (V, E) is a rooted tree rooted at r, C is a multiset of E(T) costs and P is a multiset of V(T)-1 prizes and let (T, c, p) be a security system, where c and p are bijections c: E(T) C and p: V(T) r P, respectively. Given a budget BZ+, we consider the problem of determining the existence of an edge e E(T), where c(e)=i such that the maximum total of prizes obtained from an optimal attack in the security system (T, c, p) is minimum when i is replaced by ∞. We define the decision and optimization versions of the problem and examine their computational complexities. We prove that the decision problem is NP-hard and provide a pseudopolynomial time algorithm for the optimization version of the problem. Additionally, we show that some restricted instances can be solved in polynomial time. In the end conclusion and an example of the application of the algorithm are given. 2018-11-29T07:38:12Z 2018-11-29T07:38:12Z 2018-08-21 Conference Proceeding 2-s2.0-85053450546 10.1109/ICSEC.2017.8443870 https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053450546&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/62655
institution Chiang Mai University
building Chiang Mai University Library
country Thailand
collection CMU Intellectual Repository
topic Computer Science
spellingShingle Computer Science
Supachai Mukdasanit
Sanpawat Kantabutra
The Complexity of the Infinity Replacement Problem in the Cyber Security Model
description © 2017 IEEE. In this article we present a new defensive problem on a security system. Let M be a security model (T, C, P), where T = (V, E) is a rooted tree rooted at r, C is a multiset of E(T) costs and P is a multiset of V(T)-1 prizes and let (T, c, p) be a security system, where c and p are bijections c: E(T) C and p: V(T) r P, respectively. Given a budget BZ+, we consider the problem of determining the existence of an edge e E(T), where c(e)=i such that the maximum total of prizes obtained from an optimal attack in the security system (T, c, p) is minimum when i is replaced by ∞. We define the decision and optimization versions of the problem and examine their computational complexities. We prove that the decision problem is NP-hard and provide a pseudopolynomial time algorithm for the optimization version of the problem. Additionally, we show that some restricted instances can be solved in polynomial time. In the end conclusion and an example of the application of the algorithm are given.
format Conference Proceeding
author Supachai Mukdasanit
Sanpawat Kantabutra
author_facet Supachai Mukdasanit
Sanpawat Kantabutra
author_sort Supachai Mukdasanit
title The Complexity of the Infinity Replacement Problem in the Cyber Security Model
title_short The Complexity of the Infinity Replacement Problem in the Cyber Security Model
title_full The Complexity of the Infinity Replacement Problem in the Cyber Security Model
title_fullStr The Complexity of the Infinity Replacement Problem in the Cyber Security Model
title_full_unstemmed The Complexity of the Infinity Replacement Problem in the Cyber Security Model
title_sort complexity of the infinity replacement problem in the cyber security model
publishDate 2018
url https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053450546&origin=inward
http://cmuir.cmu.ac.th/jspui/handle/6653943832/62655
_version_ 1681425847580360704