Time complexity of the edge replacement problem in a cyber security system
© 2018 IEEE. In this article, we propose a new defensive problem in a security system. Let S(T, c, p) be a security system, where T = (V, E) is a rooted tree rooted at r, c and p are assignment functions c: E(T) → + and p: V(T) {r} → +, respectively. Additionally, let T[v] be a rooted subtree rooted...
Saved in:
Main Author: | |
---|---|
Format: | Conference Proceeding |
Published: |
2019
|
Subjects: | |
Online Access: | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85066496357&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/65507 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Chiang Mai University |
id |
th-cmuir.6653943832-65507 |
---|---|
record_format |
dspace |
spelling |
th-cmuir.6653943832-655072019-08-05T04:39:16Z Time complexity of the edge replacement problem in a cyber security system Supachai Mukdasanit Computer Science Engineering Mathematics © 2018 IEEE. In this article, we propose a new defensive problem in a security system. Let S(T, c, p) be a security system, where T = (V, E) is a rooted tree rooted at r, c and p are assignment functions c: E(T) → + and p: V(T) {r} → +, respectively. Additionally, let T[v] be a rooted subtree rooted at v of T that is obtained by removing an edge {u, v} E(T), where u is the parent of v, from T. Given a security system S(T, c, p) and a budget B+, we consider the problem of determining an edge {u, v} E(T) and an edge {w′, v}, where a vertex w′ V(T)\ V(T[v]), such that the maximum total of prizes obtained from an optimal attack in S(T′, c′, p) is minimized when {u, v} has been replaced by {w′, v}, where c′({w′, v}) = c({u, v}) and for all edge e E(T′) \{w′, v}, c′(e) = c(e). We define the decision and optimization versions of the problem to use when determining time computational complexities. We prove that the decision version is coNP-hard. Additionally, we show that the optimization version can be solved in pseudo-polynomial time. Conclusion and open problems are given in the last section. 2019-08-05T04:34:36Z 2019-08-05T04:34:36Z 2019-05-10 Conference Proceeding 2-s2.0-85066496357 10.1109/ICSEC.2018.8712797 https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85066496357&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/65507 |
institution |
Chiang Mai University |
building |
Chiang Mai University Library |
country |
Thailand |
collection |
CMU Intellectual Repository |
topic |
Computer Science Engineering Mathematics |
spellingShingle |
Computer Science Engineering Mathematics Supachai Mukdasanit Time complexity of the edge replacement problem in a cyber security system |
description |
© 2018 IEEE. In this article, we propose a new defensive problem in a security system. Let S(T, c, p) be a security system, where T = (V, E) is a rooted tree rooted at r, c and p are assignment functions c: E(T) → + and p: V(T) {r} → +, respectively. Additionally, let T[v] be a rooted subtree rooted at v of T that is obtained by removing an edge {u, v} E(T), where u is the parent of v, from T. Given a security system S(T, c, p) and a budget B+, we consider the problem of determining an edge {u, v} E(T) and an edge {w′, v}, where a vertex w′ V(T)\ V(T[v]), such that the maximum total of prizes obtained from an optimal attack in S(T′, c′, p) is minimized when {u, v} has been replaced by {w′, v}, where c′({w′, v}) = c({u, v}) and for all edge e E(T′) \{w′, v}, c′(e) = c(e). We define the decision and optimization versions of the problem to use when determining time computational complexities. We prove that the decision version is coNP-hard. Additionally, we show that the optimization version can be solved in pseudo-polynomial time. Conclusion and open problems are given in the last section. |
format |
Conference Proceeding |
author |
Supachai Mukdasanit |
author_facet |
Supachai Mukdasanit |
author_sort |
Supachai Mukdasanit |
title |
Time complexity of the edge replacement problem in a cyber security system |
title_short |
Time complexity of the edge replacement problem in a cyber security system |
title_full |
Time complexity of the edge replacement problem in a cyber security system |
title_fullStr |
Time complexity of the edge replacement problem in a cyber security system |
title_full_unstemmed |
Time complexity of the edge replacement problem in a cyber security system |
title_sort |
time complexity of the edge replacement problem in a cyber security system |
publishDate |
2019 |
url |
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85066496357&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/65507 |
_version_ |
1681426281819799552 |