Time complexity of the edge replacement problem in a cyber security system

© 2018 IEEE. In this article, we propose a new defensive problem in a security system. Let S(T, c, p) be a security system, where T = (V, E) is a rooted tree rooted at r, c and p are assignment functions c: E(T) → + and p: V(T) {r} → +, respectively. Additionally, let T[v] be a rooted subtree rooted...

Full description

Saved in:
Bibliographic Details
Main Author: Supachai Mukdasanit
Format: Conference Proceeding
Published: 2019
Subjects:
Online Access:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85066496357&origin=inward
http://cmuir.cmu.ac.th/jspui/handle/6653943832/65507
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Chiang Mai University
id th-cmuir.6653943832-65507
record_format dspace
spelling th-cmuir.6653943832-655072019-08-05T04:39:16Z Time complexity of the edge replacement problem in a cyber security system Supachai Mukdasanit Computer Science Engineering Mathematics © 2018 IEEE. In this article, we propose a new defensive problem in a security system. Let S(T, c, p) be a security system, where T = (V, E) is a rooted tree rooted at r, c and p are assignment functions c: E(T) → + and p: V(T) {r} → +, respectively. Additionally, let T[v] be a rooted subtree rooted at v of T that is obtained by removing an edge {u, v} E(T), where u is the parent of v, from T. Given a security system S(T, c, p) and a budget B+, we consider the problem of determining an edge {u, v} E(T) and an edge {w′, v}, where a vertex w′ V(T)\ V(T[v]), such that the maximum total of prizes obtained from an optimal attack in S(T′, c′, p) is minimized when {u, v} has been replaced by {w′, v}, where c′({w′, v}) = c({u, v}) and for all edge e E(T′) \{w′, v}, c′(e) = c(e). We define the decision and optimization versions of the problem to use when determining time computational complexities. We prove that the decision version is coNP-hard. Additionally, we show that the optimization version can be solved in pseudo-polynomial time. Conclusion and open problems are given in the last section. 2019-08-05T04:34:36Z 2019-08-05T04:34:36Z 2019-05-10 Conference Proceeding 2-s2.0-85066496357 10.1109/ICSEC.2018.8712797 https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85066496357&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/65507
institution Chiang Mai University
building Chiang Mai University Library
country Thailand
collection CMU Intellectual Repository
topic Computer Science
Engineering
Mathematics
spellingShingle Computer Science
Engineering
Mathematics
Supachai Mukdasanit
Time complexity of the edge replacement problem in a cyber security system
description © 2018 IEEE. In this article, we propose a new defensive problem in a security system. Let S(T, c, p) be a security system, where T = (V, E) is a rooted tree rooted at r, c and p are assignment functions c: E(T) → + and p: V(T) {r} → +, respectively. Additionally, let T[v] be a rooted subtree rooted at v of T that is obtained by removing an edge {u, v} E(T), where u is the parent of v, from T. Given a security system S(T, c, p) and a budget B+, we consider the problem of determining an edge {u, v} E(T) and an edge {w′, v}, where a vertex w′ V(T)\ V(T[v]), such that the maximum total of prizes obtained from an optimal attack in S(T′, c′, p) is minimized when {u, v} has been replaced by {w′, v}, where c′({w′, v}) = c({u, v}) and for all edge e E(T′) \{w′, v}, c′(e) = c(e). We define the decision and optimization versions of the problem to use when determining time computational complexities. We prove that the decision version is coNP-hard. Additionally, we show that the optimization version can be solved in pseudo-polynomial time. Conclusion and open problems are given in the last section.
format Conference Proceeding
author Supachai Mukdasanit
author_facet Supachai Mukdasanit
author_sort Supachai Mukdasanit
title Time complexity of the edge replacement problem in a cyber security system
title_short Time complexity of the edge replacement problem in a cyber security system
title_full Time complexity of the edge replacement problem in a cyber security system
title_fullStr Time complexity of the edge replacement problem in a cyber security system
title_full_unstemmed Time complexity of the edge replacement problem in a cyber security system
title_sort time complexity of the edge replacement problem in a cyber security system
publishDate 2019
url https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85066496357&origin=inward
http://cmuir.cmu.ac.th/jspui/handle/6653943832/65507
_version_ 1681426281819799552