Next Article in Journal
Observer-Based Robust Control Method for Switched Neutral Systems in the Presence of Interval Time-Varying Delays
Next Article in Special Issue
Optimized Task Group Aggregation-Based Overflow Handling on Fog Computing Environment Using Neural Computing
Previous Article in Journal
Automatic Feature Selection for Stenosis Detection in X-ray Coronary Angiograms
Previous Article in Special Issue
Analysis of MAP/PH/1 Queueing System with Degrading Service Rate and Phase Type Vacation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures

by
Alexander Shiroky
* and
Andrey Kalashnikov
V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, 117997 Moscow, Russia
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(19), 2468; https://doi.org/10.3390/math9192468
Submission received: 16 August 2021 / Revised: 22 September 2021 / Accepted: 26 September 2021 / Published: 3 October 2021
(This article belongs to the Special Issue Distributed Computer and Communication Networks)

Abstract

:
This paper deals with the problem of managing the risks of complex systems under targeted attacks. It is usually solved by using Defender–Attacker models or similar ones. However, such models do not consider the influence of the defending system structure on the expected attack outcome. Our goal was to study how the structure of an abstract system affects its integral risk. To achieve this, we considered a situation where the Defender knows the structure of the expected attack and can arrange the elements to achieve a minimum of integral risk. In this paper, we consider a particular case of a simple chain attack structure. We generalized the concept of a local risk function to account for structural effects and found an ordering criterion that ensures the optimal placement of the defending system’s elements inside a given simple chain structure. The obtained result is the first step to formulate the principles of optimally placing system elements within an arbitrarily complex network. Knowledge of these principles, in turn, will allow solving the problems of optimal allocation of resources to minimize the risks of a complex system, considering its structure.

1. Introduction

One of the most topical problems in studying complex networks is developing mathematical models of various disruptive effects, including targeted attacks on the nodes or edges of a network. Such models assess the risks and the propagation of failures in complex systems of different natures. This approach is widely used in solving the problems of cyber-physical systems [1,2], computing systems [3,4], epidemiology [5,6], as well as other subject areas.
The classic approach considers such impacts (or attacks) as an accidental (unintentional) occurrence. The corresponding models are the error tolerance model [7]; “forest fire”-based models [8], including the one with immune trees [9]; demon model [10]; cellular automata-based model [11,12]; and random attack percolation models [13,14]. The latter ones, including the targeted attack percolation models [15,16,17,18], localized attack percolation models [19], and k-core percolation [20,21,22,23], are also used to simulate the intentional attacks on a network’s nodes and edges, assuming that the Attacker tries to disrupt the network connectivity as quickly as possible.
In terms of complex network risk management problems, these percolation models naturally belong to a broader class of Defender–Attacker–Defender (D-A-D) models [24,25]. Such models consider the conflict between two actors. One of them is the Attacker, who brings a negative impact on the network. The other one is the Defender, who tries to resist it. D-A-D models generally assume that the Attacker and the Defender have limited resources to undertake their actions. In this case, the problem is the optimization of resources for both actors. However, the Defender can also act differently, e.g., intentionally changing the complex network’s structure to reduce risks. We can mention cascading failure propagation models [26,27] as an example of such models for non-targeted attacks and their implementation in several interconnected networks. For instance, paper [28] describes the model for two interconnected networks.
Models considering the intentional modification (or establishing) of the network structure by the Defender to counter the targeted attacks seem to exist only for interconnected networks [29,30,31].
Networks describing real-world systems mostly have a pre-defined and fixed structure. At the same time, there are practical challenges, e.g., building a layered defense or a multi-level defense, where the Defender can choose the structure of the protected system to restrict the malicious acts. The authors could not find any mathematical models describing this case in the literature.
Table 1 shows the classification of the above-mentioned mathematical models. The models describing the influence of a complex network structure on its risk are in cell (4).
The purpose of this study is to examine how the Defender could lower the integral risk to a network by choosing (or changing) its structure. We consider a simple case of a chain structure. The Defender can place elements with different local risks into its nodes. We formulated the optimal placement criteria for such structures. The Defender will use the obtained results when solving the problem of optimal resources allocation with classic Defender–Attacker and Defender–Attacker–Defender models of countering the attacks in complex systems, or models of effective security monitoring and risk management of complex networks, which we have considered in prior studies [32,33]. The obtained results are the step towards deriving the optimal placement criteria for arbitrary structures.
The structure of the study is as follows. Section 2 describes the general statement of the problem of managing the risks of the complex system under attack with a known structure. We also prove several supplemental statements. Section 3 considers the problem of finding the optimal mapping of the system elements onto a given simple chain attack structure and solving it.

2. General Problem Statement

We use the general risk model described in [34] adopted to consider the influence of a system structure.
Consider a complex system consisting of a finite set of elements (objects, so far of an arbitrary nature): S = {s1, …, si, …, sn}, i ∈ N = {1, …, n}. We assume that the elements si ∈ S, i ∈ N of the system are autonomous so that they cannot influence each other’s states.
Suppose that there are two subjects (also of an arbitrary nature for the time being), which we will call player A (otherwise, the Attacker) and player D (otherwise, the Defender). These two subjects have different intentions towards the state of system S.
We assume that player D has a certain resource quantity X ≥ 0, which he can arbitrarily distribute among the elements of the system S: x = (x1, …, xn), xi ≥ 0, i ∈ N, i = 1 n x i     X .
Similarly, we assume that player A also has a certain quantity of resource Y ≥ 0, which he can arbitrarily distribute among the elements of the system S: y = (y1, …, yn), yi ≥ 0, i ∈ N, i = 1 n y i     Y .
In the framework of the considered model, we will consider the “resource” as any measurable and arbitrarily divisible asset represented by a non-negative real number. It could be financial, labour, time, production, and other resources/costs depending on the context.
We will call the local risk some local characteristic of an element si ∈ S, depending on the quantity of resources allocated by players D and A. The local risk characteristic represents possible losses (damage) due to changing the element’s state.
In turn, we will call the integral risk some overall characteristic of the entire system S, depending on the quantity of resources allocated by players D and A to all its elements, and associated with possible losses (damage) because of a state change of each element.
If the system’s elements are autonomous, the local risk of any element will depend on the quantity of resources allocated to it by players D and A. We define the local risk function for each element as ρ i   ( x i ,   y i ) :   0 + × 0 + 0 + , where 0 + is a set of non-negative real numbers.
Considering the described model, we will further assume that the local risk functions ρi (·, ·), i ∈ N, have the following properties:
  • Risk non-negativity:
    i     N ,   x i ,   y i     0 :   ρ i x i ,   y i     0 .
  • Risk monotonicity:
    i     N : ρ i x i ,   y i x i     0 ,   ρ i x i ,   y i y i     0 .
  • Risk finiteness:
    i     N ,   x i ,   y i     0     ρ i x   = const ,   ρ i y   = const :   0   <   ρ i x     ρ i x i ,   y i     ρ i y .
The risk non-negativity property means that the potential damage associated with a local risk occurrence for any element si ∈ S cannot be negative. We assume that there is always a positive residual risk in the common case, regardless of the measures taken to reduce it. There are only separate, exceptional cases when risk can be lower to zero.
The risk monotony property means that the additional allocation of resources to any element si ∈ S by the Defender should not increase the local risk for any element of system S. On the other hand, the additional resource allocation by the Attacker should not decrease the local risk for any element of system S.
The risk finiteness property means that the Defender cannot reduce the residual risk for any element si ∈ S to a zero value, and, on the other hand, there is a final positive marginal risk for any element si ∈ S (regardless of the quantity of resources spent by the Attacker).
Let the structure W = 〈G (S, E), T〉 be a graph with a set of elements S as its vertices, a set of edges E, and a specific subset of vertices T ⊆ S, which we will call the perimeter of the system S.
We assume that player A attacks the elements of the system for the selected path c = (v, …, w), v, w ∈ S and transits from some vertex si ∈ c to an adjacent vertex sj ∈ c only if his attack on the element si was successful. If the element si ∈ S is in state ei = 1, we assume it operates in its normal mode. If ei = 0, then the element si is not operational, which means player A has successfully disabled it.
Let x = (x1, …, xn), y = (y1, …, yn) be some valid resource distributions among the vertices (elements) of the system S for players D and A, respectively. Consider the local risk functions for each vertex si ∈ S as follows:
ρi (x, y) = ui (x, y)pi (x, y)
where u i x ,   y :   n +   ×   n +     0 + is a function describing the dependence of the expected damage in the case of a successful attack depending on the resource distributions x and y, and p i x ,   y :   n +   ×   n +     ( 0 ,   1 ] is the probability of a successful attack depending on the distributions x and y.
The following tuple defines the basic risk management model for complex systems with the structure and the perimeter:
S = s i i     N ,   T ,   E ,   D ,   A ,   x ,   y ,   ρ i · ,   · i     N ,   ρ · ,   ·
If the structure is W = 〈G (S, E), T〉 is defined, then:
  • The Defender’s goal is to allocate the available resource X among the elements of the system S to reduce the value of the integral risk function ρ (x, y) to a minimum.
  • On the contrary, the Attacker’s goal is to distribute the available resource Y among the system elements S to increase the value of the integral risk function ρ (x, y) to a maximum.
Let p i 0 x i ,   y i :   R 0 +   ×   R 0 +     p min ,   1 ,   p min = min i     N   min x i ,   y i   p i 0 x i ,   y i   >   0 be a function describing the relationship between of the probability of a successful attack on the vertex si and the quantity of resources xi and yi allocated to it by players D and A, respectively, in an isolated case, i.e., without considering the structure V. Then, the value ρ i 0 x i ,   y i   = u i x ,   y p i 0 x i ,   y i will be called the eigen local risk.
For simplicity, we consider a special case when expected damage is independent of x, y, i.e., u i x ,   y   = u i   >   0 ∀i ∈ N.
The following propositions are correct.
Proposition 1.
If the graph G (S, E) is connected, then ∀i ∈ N: si ∈ S\T, there is a simple path, including vertices s i   =   s i m ,   s i m 1 ,   ,   s i 1 ,   s i 0 ;   s i 1 ,   ,   s i m   S \ T ,   s i 0   T that p i x ,   y   = p i 0 x i ,   y i max s j     S ˜ i p j x ,   y   = p i 0 0 x i 0 ,   y i 0 p i 1 0 x i 1 ,   y i 1   p i m 1 0 x i m 1 ,   y i m 1   p i m 0 x i m ,   y i m , where S ˜ i     S is the set of vertices adjacent to si.
Proof. 
The existence of a simple path directly follows from the connectivity of the graph. Let us prove the equality. Partition S0, S1, … of the vertex set S is as follows. We include all the vertices of the perimeter T ⊆ S in the set S0. All the vertices si ∈ S\S0 adjacent to the vertices of set S0 are included in the set S1. We continue this until we distribute all the vertices of S over the sets S0, S1, …, Sl, i.e., ∀i ∈ N ∃j ∈ {0, 1, …, l}: si ∈ Sj. Note that under n < ∞, this process is finite, and l ≤ n − 1. The equality will have place if the graph G (S, E) is the chain on n vertices.
Let us consider an arbitrary vertex s i   = s i m   S 1 . If there is only one vertex in the set S1, then s i 0   S 0 :   p i x ,   y   = p i m 0 x i m ,   y i m max s j   S ˜ i p j x ,   y   = p i m 0 x i m ,   y i m p i 0 0 x i 0 ,   y i 0 , where S ˜ i     S is the set of vertices adjacent to si. We provide a proof by contradiction when the set S1 contains more than one vertex.
Suppose that s i 0   S 0   p i m 0 x i m ,   y i m max s j   S ˜ i p j x ,   y   >   p i m 0 x i m ,   y i m p i 0 0 x i 0 ,   y i 0 . Then, s i m 1   S 1     S 2 :   p i m 1 x ,   y   = max s j   S ˜ i p j x ,   y . Due to the vertex attack order defined above and the definition of the local risk function ρ i m 1 x ,   y , the notation of the latter necessarily includes the multipliers p i m 1 0 x i m 1 ,   y i m 1 and p k 0 0 x k 0 ,   y k 0 , where p k 0 0 x k 0 ,   y k 0 is the probability of a successful attack of some vertex s k 0   S 0 , for which there is a chain s i m 1 ,   ,   s k 0 of length m − 1 connecting s k 0 with s i m 1   S 1     S 2 .
That is, max s j   S ˜ i p j x ,   y   =   p i m 1 x ,   y   = p k 0 0 x k 0 ,   y k 0 p i m 1 0 x k m 1 ,   y k m 1 , with all multipliers not exceeding the value of 1. However, then p k 0 0 x k 0 ,   y k 0 p i m 1 0 x i m 1 ,   y i m 1 p i m 0 x i m ,   y i m   >   p i m 0 x i m ,   y i m     p k 0 0 x k 0 ,   y k 0 , since (according to the above assumption) this inequality holds for all S0 vertices, including s i m . Since the values in both sides of the inequality are strictly positive, and all the multipliers in the left side do not exceed 1, our assumption is incorrect. The above-described considerations are valid for any pair of sets Sk, Sk+1 of the S partition. □
Proposition 2.
If ∀I ∈ N functions p i 0   ( x i ,   y i ) monotonically decrease with the first argument and monotonically increase with the second one, then the functions pi (x, y) = uipi (x, y), satisfy the properties (1)−(3) for all i ∈ N.
Proof. 
First, we prove the boundedness. From the definition of the functions p i x ,   y , p i 0 x i ,   y i and the proposition 1, it follows that ρ i x ,   y   = u i p i x ,   y     u max   , and the equality will have place only when pi (x, y) = 1 and ui = umax. We show that ∃ρx > 0: ∀x, y ρi (x, y) ≥ ρx.
According to proposition 1, ρi (x, y) could be represented as follows:
ρ i x ,   y   = u i p i 0 0 x i 0 ,   y i 0 p i 1 0 x i 1 ,   y i 1 p i m 1 0 x i m 1 ,   y i m 1 p i m 0 x i m ,   y i m
where s i 0   T ,   s i 1 ,   ,   s i m = s i   S \ T ,   p i m 0 x i m ,   y i m   = p i 0 x i ,   y i .
By definition, p i 0 x i ,   y i     [ p min ,   1 ] ,   p min   >   0 − hence, the desired ρ x = u min p min m + 1 , where u min = min i     N   u i . The equality ρi (x, y) = ρx will have place when ui = umin, and p i 0 0 x i 0 ,   y i 0   = p i 1 0 x i 1 ,   y i 1   = = p i m 0 x i m ,   y i m   = p min . Note that the boundedness pi(x, y) also implies that it is positively defined. □
Proposition 3.
Adding structure W = 〈G (S, E), T〉 to the system does not increase the risk, i.e., ∀S = {s1, …, sn} ∀V ≠ ∅, T ⊆ S ρW (x, y) ≤ ρ (x, y), where ρ W x ,   y   = i = 1 n ρ i   ( x ,   y ) , and   ρ x ,   y   = i = 1 n ρ i 0   ( x ,   y ) .
Proof. 
First, we note that the perimeter T ⊆ S must include vertices from each connected component of the graph G (S, E). Indeed, if it does not, then there is a vertex si ∈ S in the graph for which there is no simple path ending with a vertex from the perimeter T ⊆ S. Such a vertex is unattainable for the Attacker, which means pi (x, y) = 0, and contradicts the property (3).
Consider the case when the set of edges is empty, i.e., G (S, E) = G (S, ∅). Then, T = S and, according to the definition of the local risk functions, ρ G   ( S ,   ) ,   S x ,   y   = i = 1 n u i p i x ,   y   = i = 1 n u i p i 0 x i ,   y i .
Now, we assume that E ≠ ∅. If the perimeter T coincides with the set of all vertices S, then ρ G   ( S ,   E ) ,   S x ,   y   = i = 1 n u i p i 0 x i ,   y i   = ρ G   ( S ,   ) ,   S x ,   y . If T ⊂ S, then, according to the proposition 1, for each vertex sj ∈ S\T, there is the following local risk function:
ρ j x ,   y   = u i p j 0 0 x j 0 ,   y j 0 p j 1 0 x j 1 ,   y j 1 p j m 1 0 x j m 1 ,   y j m 1 p j m 0 x j m ,   y j m
where s j 0   T ,   s j 1 ,   ,   s j m = s j     S \ T ,   p j m 0 x j m ,   y j m   = p j 0 x j ,   y j . Since all the multipliers in the right part of the expression, except the first one, do not exceed 1, then ρ j x ,   y     u i p j 0 x j ,   y j   j     N :   s j     S \ T , and therefore,
ρ G   ( S ,   E ) ,   T x ,   y   = i = 1 n u i p i   ( x ,   y )     i = 1 n u i p i 0 x ,   y   = ρ G   ( S ,   ) ,   S x ,   y
The proof is complete. □

3. The Problem of the Optimal Placement of System Elements within a Given Structure

Consider a complex system consisting of a finite set of elements S = {s1, …, si, …, sn}, i ∈ N = {1, …, n}. Let us introduce some unilaterally connected graph G (V, E), where V is a set of n vertices, and a subset of k ≤ n vertices T ⊆ V, which we will consider as a perimeter. The problem is to construct such a mapping S → T that the integral risk ρ (x, y) is minimal. Note that such mapping will be one-to-one.
Let us consider the solution for the simplest chain structure.
Definition 1.
Given the graph   G V =   v 1 ,   ,   v m ,   E =     ( v i ,   v i + 1 ) i = 1 m 1 ,   m     , and the perimeter T = {v1}. Then, we say that the tuple Wm = 〈G (V, E), T〉 sets a simple chain structure of length m.
Definition 2.
Consider the one-to-one mapping M−1: S → V\{vn+1, …, vm}, S = {s1, …, sn}, n ≤ m: ∀i ≤ n ∃j ≤ n: vj = M−1 (si) as the placement of elements S in the structure Wm. The corresponding inverse map M: V → S will be called the projection of the structure W onto the set of elements S.
In the future, if n and m are equal, we will omit the lower index of the structure’s notation, except in cases when we need to emphasize the length of the specified structure.
For an arbitrary given placement M−1: S → V\{vn+1, …, vm}, we can calculate the value of the integral risk:
  ρ S ,   W ,   M 1   = i = 1 n ρ M   ( v i )
where ρ M   v i is the local risk value for the element M (vi). Now, let us state the problem of minimizing the integral risk. The problem consists in finding a set of placements that achieve the integral risk minimum value ρmin:
M min = argmin M 1   ρ S ,   W ,   M 1 :   ρ min = i = 1 n ρ M   ( v i )   M 1   M min
Definition 3.
Given simple chain structure W. Suppose that for any placements M−1, K−1 and any such indices p, q, k, l, p < q, k > l, that si = M (vp) = K (vk), sj = M (vq) = K (vl), there is inequality p (S, W, M−1) ≤ p (S, W, K−1) (p (S, W, M−1) ≥ p (S, W, K−1)). Then, we will say that the nodes si, sj ∈ S, i, j ∈ N, and i ≠ j are non-strictly ordered in the local risk ascending (descending) order and write si ≼ sj (si ≽ sj).
First, let us assume that all elements S = {s1, s2, …, sn} of the considered system are equivalent, i.e., u 1   =   u 2   = =   u n   =   u max , and their probabilities of a successful attack do not depend on the quantity of resources allocated by the players, i.e., i ,   p i 0 x i ,   y i   = p i 0 ,   0   <   p i 0     1 .
Given a simple chain structure Wn, for an arbitrary given placement M−1: S → V, the value of the integral risk should be calculated as follows:
ρ M = i = 1 n ρ M   ( v i ) = i = 1 n u max p M   ( v i ) = u max i = 1 n p M v i
Consider that n = 2 ,   S =   s 1 ,   s 2 ,   p 1 0   <   p 2 0 , and a simple chain structure W2 is given. Note that the local risk function value for the element corresponding to the vertex v2 will be equal to ρ 2   = u max p 1 0 p 2 0 , regardless of the selected placement. Thus, it is enough to select a node to map to v1. Since p 1 0   <   p 2 0 , u max p 1 0   +   p 1 0 p 2 0   <   u max p 2 0 + p 1 0 p 2 0 , the element s1 must be mapped at the vertex v1.
Proposition 4.
Suppose that for   N =   1 ,   ,   n ,   S =   s 1 ,   ,   s n ,   p 1 0   <     <   p n 0 , the optimal placement of the system’s elements in a simple chain structure Wn+1 is M−1: S → V: si = M (vi) ∀i ∈ N, i.e., such that the element numbers coincide with the vertex numbers. Then, for any such system of (n + 1) elements S = S     s n + 1   that p 1 0   <     <   p n 0   <   p n + 1 0 , the placement M−1 is also optimal.
Proof. 
Note that the expressions for the integral risk have the same number of summands, and the first one includes 1 multiplier, the second one has 2 of them, and the n-th has n multipliers. Since all the multipliers are the probabilities of a successful attack, they cannot exceed 1. Note that the summands in the same positions in the expressions should be in ascending order, and under the selected numbering, this ordering sets the lexicographic order.
Choose an arbitrary index value 1 < j ≤ n. We then map the (n + 1)-th element to vertex vj and show that the value of the integral risk is greater than if we had mapped the above element to vertex vn+1. Let us write the expression of integral risk ρj for the case when (n + 1)-th element is mapped to the j-th vertex:
ρ j   = u max   p 1 0   +   p 1 0 p 2 0   + +   p 1 0 p 2 0 p j 1 0   +   p 1 0 p j 1 0 p n + 1 0   + +   p 1 0 p j 1 0 p n + 1 0 p j 0 p j + 1 0 p n 0  
Now, we write the expression of the integral risk pn+1 for the case when the (n + 1)-th element is mapped to the (n + 1)-th vertex:
ρ n + 1   = u max   p 1 0   +   p 1 0 p 2 0   + +   p 1 0 p 2 0 p j 1 0   +   p 1 0 p j 1 0 p j 0   + +   p 1 0 p j 1 0 p j 0 p j + 1 0 p n 0 p n + 1 0
Both expressions have the same number of summands. Let us compare them in pairs. The first (j − 1) summands in both expressions are the same. Let us write in general form the expressions for the summands with the number j ≤ i ≤ n for the first and second cases, respectively:
p 1 0 p j 1 0 p n + 1 0 p j 0 p j + 1 0 p i 1 0
p 1 0 p j 1 0 p j 0 p j + 1 0 p i 1 0 p i 0
The number of multipliers in the form of both summands is the same, the multipliers themselves are also the same, except for p n + 1 0 and p i 0 , which are only in (14) and (15), respectively. However, p i 0   <   p n + 1 0 , and therefore, each summand in the expression for the integral risk ρn+1 with the number i ≥ j will be less than the summand with the same number in the expression for the integral risk ρj.
Since we chose N arbitrarily, the statement is proved by mathematical induction. □
Now, let us assume that the expected damage and the probability of a successful attack could be different for the non-matching elements of the considered system but still do not depend on the quantity of resources distributed by the Defender and the Attacker.
Given n = 2, S = {s1, s2} and a simple chain structure W2. The integral risk expressions for two possible placements of system elements at the W2 vertices are shown in Table 2.
Subtract the expression of the integral risk in the second line from the expression in the first line and give similar summands. We then obtain:
D = u 1 p 1 0   +   u 2 p 1 0 p 2 0     u 2 p 2 0     u 1 p 1 0 p 2 0   = u 1 p 1 0 1     p 2 0   +   u 2 p 2 0 p 1 0     1 = = u 1 p 1 0 1     p 2 0     u 2 p 2 0 1     p 1 0
If u 1 u 2 < p 2 0 1     p 1 0 p 1 0 1     p 2 0 , then D < 0, and the optimal placement is in the first line of the Table 2. If u 1 u 2 > p 2 0 1     p 1 0 p 1 0 1     p 2 0 , then D > 0, and the optimal placement is specified in the second line of the table. Finally, at u 1 u 2 = p 2 0 1     p 1 0 p 1 0 1     p 2 0 both placements give the same integral risk value.
Proposition 5 (ordering criterion).
Let N = {1, …, n}, S = {s1, …, sn}. ∀i ∈ N\{n} si ≼ si+1 u i u i + 1     p i + 1 0 1     p i 0 p i 0 1     p i + 1 0 ; si ≽ si+1 u i u i + 1     p i + 1 0 1     p i 0 p i 0 1     p i + 1 0 .
Proof. 
The criterion validity directly follows from the above example. □
Proposition 6 (ordering criterion transitivity).
Let N = {1, …, n}, S = {s1, …, sn}. ∀i, j, k ∈ N: i < j < k si ≼ sj ≼ sk ⟹ si ≼ sk.
Proof. 
Let us rewrite the proposition in the algebraic form:
u i     u j p j 0 1     p i 0 p i 0 1     p j 0 ,   u j     u k p k 0 1     p j 0 p j 0 1     p k 0
We must prove that
u i     u k p k 0 1     p i 0 p i 0 1     p k 0
Note that
u i     u j p j 0 1     p i 0 p i 0 1     p j 0     u k p k 0 1     p j 0 p j 0 1     p i 0 p j 0 1     p k 0 p i 0 1     p j 0 = u k p k 0 1     p i 0 p i 0 1     p k 0
which was to be proved. □
Proposition 7.
Consider N = {1, …, n}, S = {s1, …, sn}, s1 ≼ s2 ≼ ⋯ ≼ sn and a simple chain structure Wn = 〈G (S, E), T〉. Then, the placement M−1: S → V: si = M (vi) ∀i ∈ N minimizes the integral risk, i.e., ρ (S, W, M−1) = ρmin.
Proof. 
from the opposite. Let us assume that there are such numbers i, j ∈ N, i ≠ j that the integral risk will decrease if the element si is placed to the vertex vj. There are two possible options:
  • i > j. Then, when one moves the element si from the vertex vi to vj, there will be a shift in the range of vertices from vj to vi. That is, the element sj will move to the vertex vj+1, sj+1 to vj+2, and so on, up to the element si−1. The last one will occupy the vacated vertex vi.
  • i < j. Then, when one moves the element si from the vertex vi to vj there will be a shift in the range of vertices from vi to vj. That is, the element si+1 will move to the vertex vi, si+2 to vi+1, and so on, until the element sj, which will take the vacant vertex vj−1.
Consider the first option. Denote the values of the integral risk ρj and write an expression for the resulting placement of elements:
ρ j   = u 1 p 1 0   +   u 2 p 1 0 p 2 0   + +   u j 1 p 1 0 p j 1 0   +   u i p 1 0 p j 1 0 p i 0   +   u j p 1 0 p j 1 0 p i 0 p j 0 + + u i 1 p 1 0 p j 1 0 p i 0 p j 0 p i 1 0   +   u i + 1 p 1 0 p j 1 0 p i 0 p j 0 p i 1 0 p i + 1 0   + +   u n p 1 0 p n 0
The expression for the integral risk of the original placement in turn is as follows:
ρ 0   = u 1 p 1 0   +   u 2 p 1 0 p 2 0   + +   u j 1 p 1 0 p j 1 0   +   u j p 1 0 p j 1 0 p j 0   + +   u i 1 p 1 0 p j 1 0 p j 0 p i 1 0   +   u i p 1 0 p i 0   +   u i + 1 p 1 0 p j 1 0 p j 0 p i 1 0 p i 0 p i + 1 0   + +   u n p 1 0 p n 0
Note that the sums u 1 p 1 0   +   u 2 p 1 0 p 2 0   + +   u j 1 p 1 0 p j 1 0 and u i + 1 p 1 0 p j 1 0 p j 0 p i 1 0 p i 0 p i + 1 0   + +   u n p 1 0 p n 0 occur in both expressions. According to our assumption of risk decreasing under such a permutation, we must prove that pj < p0. To realize this, we compare only the different parts of the expressions of these quantities. Let us write them out separately:
ρ ˜ j j   = u i p 1 0 p j 1 0 p i 0   +   u j p 1 0 p j 1 0 p i 0 p j 0   + +   u i 1 p 1 0 p j 1 0 p i 0 p j 0 p i 1 0
ρ ˜ 0 j = u j p 1 0 p j 1 0 p j 0   + +   u i 1 p 1 0 p j 1 0 p j 0 p i 1 0   +   u i p 1 0 p i 0
Let us rewrite ρ ˜ j j in the following form:
ρ ˜ j j   = p 1 0 p j 1 0 u i p i 0   +   u j p i 0 p j 0   + +   u i 1 p 1 0 p j 1 0 p i 0 p j 0 p i 1 0
Given to the fact that i > j and the transitivity of the risk increase ratio, we obtain si ≽ sj, and therefore, u i p i 0   +   u j p i 0 p j 0     u j p j 0   +   u i p i 0 p j 0 . This means that if one swaps the elements si and sj, that is, maps the element si to the vertex vj+1, and the element sj back to the vertex vj (where it was from the beginning), the risk will not increase. Thus:
ρ ˜ j j     u j p 1 0 p j 1 0 p j 0   +   u i p 1 0 p j 1 0 p j 0 p i 0   + +   u i 1 p 1 0 p j 1 0 p j 0 p i 0 p i 1 0
Now, to prove that pj < p0, we should compare expressions ρ ˜ j j + 1 and ρ ˜ 0 j + 1 with a smaller number of summands:
ρ ˜ j j + 1   =     u i p 1 0 p j 0 p i 0   +   u j + 1 p 1 0 p j 0 p i 0 p j + 1 0 + +   u i 1 0 p i 0 p j 0 p i 0 p j + 1 0 p i 1 0
ρ ˜ 0 j + 1   =     u j p 1 0 p j 1 0 p j 0   + +   u i 1 p 1 0 p j 1 0 p j 0 p i 1 0 + u i p 1 0 p i 0
It is easy to see that si ≽ sj+1, si ≽ sj+2, … si ≽ si−1. Therefore, we can also swap the corresponding pairs of elements without increasing the system’s integral risk. In the final iteration, we compare the following expressions:
ρ ˜ j i 1   =     u i p 1 0 p i 2 0 p i 0   +   u i 1 p 1 0 p i 2 0 p i 0 p i 1 0
ρ ˜ 0 i 1   =   u i 1 p 1 0 p i 2 0 p i 1 0   +   u i p 1 0 p i 2 0 p i 1 0 p i 0
Since ρ ˜ j i 1 = p 1 0 p i 2 0 u i p i 0   +   u i 1 p i 0 p i 1 0 , and ρ ˜ 0 i 1 = p 1 0 p i 2 0 u i 1 p i 1 0   +   u i p i 1 0 p i 0 , then, since si ≽ si−1, ρ ˜ 0 i 1   ρ ˜ j i 1 and, consequently, p0 ≤ pj, our assumption is incorrect.
For the second option, when i < j, the proof is very similar. □

4. Conclusions

This paper considers the problem of optimal placement of elements of the protected system within a given structure of the expected attack. We generalized the concept of a local risk function to account for structural effects and solved the problem for a simple chain attack structure.
The key feature of this approach is that the local risks of the system elements are functionally independent. In other words, when considering each element of the protected system in isolation, its local risk does not depend on the quantity of resources allocated to its elements by the Defender and Attacker. Simultaneously, the integral risk of the system varies with the mapping of its elements to the attack structure.
In real-world tasks, the Defender rarely can choose the placement of elements in the structure. Nevertheless, it can apply the proposed approach to consider the information about the structure of a possible attack when solving the problem of allocating resources within the classic Defender–Attacker and Defender–Attacker–Defender models.
We plan to further expand the proposed approach in order to examine more complex structures, such as trees or cycles.

Author Contributions

Conceptualization, methodology, supervision, A.K. Investigation, writing original draft, A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Guo, H.; Yu, S.S.; Iu, H.H.; Fernando, T.; Zheng, C. A complex network theory analytical approach to power system cascading failure—From a cyber-physical perspective. Chaos 2019, 29, e053111. [Google Scholar] [CrossRef]
  2. Sturaro, A.; Silvestri, S.; Conti, M.; Das, S.K. A realistic model for failure propagation in interdependent cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 2018, 7, 817–831. [Google Scholar] [CrossRef]
  3. Wang, L.; Yao, C.; Yang, Y.; Yu, X. Research on a Dynamic Virus Propagation Model to Improve Smart Campus Security. IEEE Access 2018, 6, 20663–20672. [Google Scholar] [CrossRef]
  4. Cotroneo, D.; De Simone, L.; Liguori, P.; Natella, R.; Bidokhti, N. Enhancing Failure Propagation Analysis in Cloud Computing Systems. In Proceedings of the IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Berlin, Germany, 28 October–1 November 2019; pp. 139–150. [Google Scholar] [CrossRef] [Green Version]
  5. Moore, S.; Rogers, T. Predicting the speed of epidemics spreading in networks. Phys. Rev. Lett. 2020, 124, e068301. [Google Scholar] [CrossRef] [PubMed]
  6. Hajizadeh, M.; Vishkaie, F.R.; Bakouie, F.; Gharibzadeh, S. Modeling the Outbreak of an Infectious Disease on a Heterogeneous Network. Adv. Syst. Sci. Appl. 2016, 16, 89–99. [Google Scholar]
  7. Albert, R.; Jeong, H.; Barabasi, A.-L. Error and Attack Tolerance of Complex Networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Bak, P.; Chen, K.; Tang, C. A forest-fire model and some thoughts on turbulence. Phys. Lett. A 1990, 147, 297–300. [Google Scholar] [CrossRef]
  9. Drossel, B.; Schwabl, F. Forest-fire model with immune trees. Phys. A 1993, 199, 183–197. [Google Scholar] [CrossRef]
  10. Carreras, B.A.; Newman, D.E.; Gradney, P.; Lynch, V.E.; Dobson, I. Interdependent risk in interacting infrastructure systems. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS′07), Big Island, HI, USA, 3–6 January 2007. [Google Scholar] [CrossRef]
  11. Newman, D.E.; Nkei, B.; Carreras, B.A.; Dobson, I.; Lynch, V.E.; Gradney, P. Risk assessment in complex interacting infrastructure systems. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS′05), Big Island, HI, USA, 3–6 January 2007. [Google Scholar] [CrossRef] [Green Version]
  12. Li, X.; Ji, L.; Zhu, H.; Li, P.; Jia, X.; Li, C. Cellular automata-based simulation of cross-space transmission of Energy Local Area Network risks: A case study of a power supply station in Beijing. Sustain. Energy Grids Netw. 2021, 27, e100521. [Google Scholar] [CrossRef]
  13. Gallos, L.K.; Cohen, R.; Argyrakis, P.; Bunde, A.; Havlin, S. Stability and topology of scale-free networks under attack and defense strategies. Phys. Rev. Lett. 2005, 94, e188701. [Google Scholar] [CrossRef] [Green Version]
  14. Cao, Y.Y.; Liu, R.R.; Jia, C.X.; Wang, B.H. Percolation in multilayer complex networks with connectivity and interdependency topological structures. Commun. Nonlinear Sci. Numer. Simul. 2021, 92, e105492. [Google Scholar] [CrossRef]
  15. Gallos, L.K.; Cohen, R.; Argyrakis, P.; Bunde, A.; Havlin, S.; Callaway, D.S.; Newman, M.E.J.; Strogatz, S.H.; Watts, D.J. Network robustness and fragility: Percolation on random graphs. Phys. Rev. Lett. 2000, 85, e5468. [Google Scholar] [CrossRef] [Green Version]
  16. Annibale, A.; Coolen, A.C.C.; Bianconi, G. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost. J. Phys. A 2010, 43, e395001. [Google Scholar] [CrossRef]
  17. Holme, P.; Kim, B.J.; Yoon, C.N.; Han, S.K. Attack vulnerability of complex networks. Phys. Rev. E 2002, 65, e056109. [Google Scholar] [CrossRef] [Green Version]
  18. Cohen, R.; Havlin, S.; Ben-Avraham, D. Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 2003, 91, e247901. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Shao, S.; Huang, X.; Stanley, H.E.; Havlin, S. Percolation of localized attack on complex networks. New J. Phys. 2015, 17, e023049. [Google Scholar] [CrossRef]
  20. Dorogovtsev, S.N.; Goltsev, A.V.; Mendes, J.F.F. k-Core organization of complex networks. Phys. Rev. Lett. 2006, 96, e040601. [Google Scholar] [CrossRef] [Green Version]
  21. Goltsev, A.V.; Dorogovtsev, S.N.; Mendes, J.F.F. k-Core (bootstrap) percolation on complex networks: Critical phenomena and nonlocal effects. Phys. Rev. E 2006, 73, e056101. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Azimi-Tafreshi, N.; Gómez-Gardeñes, J.; Dorogovtsev, S.N. k-Core percolation on multiplex networks. Phys. Rev. E 2014, 90, e032816. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Baxter, G.J.; Dorogovtsev, S.N.; Goltsev, A.V.; Mendes, J.F.F. Heterogeneous k-core versus bootstrap percolation on complex networks. Phys. Rev. E 2011, 83, e051134. [Google Scholar] [CrossRef] [Green Version]
  24. Brown, G.; Carlyle, M.; Salmerón, J.; Wood, R. Defending Critical Infrastructure. Interfaces 2006, 36, 530–544. [Google Scholar] [CrossRef] [Green Version]
  25. Ghorbani-Renani, N.; González, A.D.; Barker, K. A decomposition approach for solving tri-level defender-attacker-defender problems. Comput. Ind. Eng. 2021, 153, e107085. [Google Scholar] [CrossRef]
  26. Brummitt, C.D.; D’Souza, R.M.; Leicht, E. Suppressing cascades of load in interdependent networks. Proc. Natl. Acad. Sci. USA 2012, 109, E680–E689. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Gao, C.; Li, X.; Zhang, X.; Li, K. Network immunization for interdependent networks. J. Comput. Inf. Syst. 2013, 9, 6661–6668. [Google Scholar] [CrossRef]
  28. Wang, S.; Hong, L.; Chen, X. Vulnerability analysis of interdependent infrastructure systems: A methodological framework. Phys. A Stat. Mech. Appl. 2012, 391, 3323–3335. [Google Scholar] [CrossRef]
  29. Dong, G.; Gao, J.; Du, R.; Tian, L.; Stanley, H.E.; Havlin, S. Robustness of network of networks under targeted attack. Phys. Rev. E 2013, 87, 052804. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  30. Tan, F.; Xia, Y.; Zhang, W.; Jin, X. Cascading failures of loads in interconnected networks under intentional attack. EPL 2013, 102, 28009. [Google Scholar] [CrossRef]
  31. Cui, P.; Zhu, P.; Wang, K.; Xun, P.; Xia, Z. Enhancing robustness of interdependent network by adding connectivity and dependence links. Phys. A 2018, 497, 185–197. [Google Scholar] [CrossRef]
  32. Kalashnikov, A.O.; Anikina, E.V. Heterogeneous Network Security Effective Monitoring Method. Distributed Computer and Communication Networks (DCCN 2019). In Proceedings of the Communications in Computer and Information Science, Moscow, Russia, 23–27 September 2019; Vishnevskiy, V., Samouylov, K., Kozyrev, D., Eds.; Springer: Cham, Germany, 2019; Volume 1141, pp. 625–635. [Google Scholar] [CrossRef]
  33. Kalashnikov, A.O.; Anikina, E.V. Management of Risks for Complex Computer Network. Distributed Computer and Communication Networks (DCCN 2020). In Proceedings of the Communications in Computer and Information Science, Moscow, Russia, 14–18 September 2020; Vishnevskiy, V., Samouylov, K., Kozyrev, D., Eds.; Springer: Cham, Germany, 2020; Volume 1337, pp. 144–157. [Google Scholar] [CrossRef]
  34. Huang, X.; Gao, J.; Buldyrev, S.V.; Havlin, S.; Stanley, H.E. Robustness of interdependent networks under targeted attack. Phys. Rev. E 2011, 83, 065101. [Google Scholar] [CrossRef] [Green Version]
Table 1. The classification of failure propagation models on complex networks.
Table 1. The classification of failure propagation models on complex networks.
Attack
Unintentional (Random)Targeted
Network structure changesUnintentional or no changes at all(1)
Random attack percolation models [13,14]
Error tolerance model [7]
“Forest fire” (FF) [8] based models: FF with immune trees [9], Demon model [10],
Cellular automata-based model [11,12]
(2)
Attacker–Defender, Defender–Attacker, Defender–Attacker–Defender models [24,25]
Targeted attack percolation models [15,16,17,18]
Localized attack percolation models [19]
k-core percolation [20,21,22,23]
Interdependent networks robustness under targeted attacks [34]
Intentional(3)
Cascading failure propagation models [26,27]
Regular allocation strategy of bidirectional interconnections [28]
(4)
Cascading failure propagation model for networks of networks [29,30,31]
Table 2. The integral risk expressions for two possible placements of system elements in W2 structure.
Table 2. The integral risk expressions for two possible placements of system elements in W2 structure.
v1v2   ρ = i = 1 n u i p i
1s1s2 u 1 p 1 0   +   u 2 p 1 0 p 2 0
2s2s1 u 2 p 2 0   +   u 1 p 1 0 p 2 0
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shiroky, A.; Kalashnikov, A. Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures. Mathematics 2021, 9, 2468. https://doi.org/10.3390/math9192468

AMA Style

Shiroky A, Kalashnikov A. Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures. Mathematics. 2021; 9(19):2468. https://doi.org/10.3390/math9192468

Chicago/Turabian Style

Shiroky, Alexander, and Andrey Kalashnikov. 2021. "Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures" Mathematics 9, no. 19: 2468. https://doi.org/10.3390/math9192468

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop