JOURNAL ARTICLE

Optimal resource allocation for protecting system availability against random cyber attacks

Abstract

Distributed systems usually provide services with varying criticalities. Failures of core services lead to catastrophic consequences to the system. Maintaining system core services' availability with limited resources has become a challenging issue, especially when system operates in an adversary environment and face malicious under attack. This paper discusses the attacker-defender problem and analyzes how to allocate resources to maximize system availability, especially the core services availability. In our model, the defender seeks to maintain maximum system availability for a given period of time, and does so by distributing defensive resources to component protection enhancement, creation of redundant components, and camouflaged components deployment. We assume that the attacker has no knowledge about the system configuration, and hence randomly attacks different nodes in the system. We formulate this attacker-defender problem as a defender's optimization problem and present an algorithm that optimally allocates system resource to achieve maximum system availability.

Keywords:
Adversary Software deployment Computer science Computer security Limited resources Resource (disambiguation) Core (optical fiber) Resource allocation Component (thermodynamics) High availability Distributed computing Computer network Risk analysis (engineering) Business Telecommunications

Metrics

14
Cited By
5.98
FWCI (Field Weighted Citation Impact)
33
Refs
0.96
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Reliability and Maintenance Optimization
Physical Sciences →  Engineering →  Safety, Risk, Reliability and Quality
Software Reliability and Analysis Research
Physical Sciences →  Computer Science →  Software

Related Documents

JOURNAL ARTICLE

Optimal defense resource allocation against cyber-attacks in distributed generation systems

Huadong MoXun XiaoGiovanni SansaviniDaoyi Dong

Journal:   Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability Year: 2023 Vol: 238 (6)Pages: 1302-1329
JOURNAL ARTICLE

Protecting Against Cyber Attacks

Journal:   Dental Abstracts Year: 2025 Vol: 70 (6)Pages: 418-420
DISSERTATION

Protecting networks against diffusive attacks: game-theoretic resource allocation for contagion mitigation

Tsai, Jason (author)

University:   University of Southern California Digital Library Year: 2013
© 2026 ScienceGate Book Chapters — All rights reserved.