当前位置: X-MOL 学术J. Comput. Syst. Sci. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Attack and defense in the layered cyber-security model and their (1 ± ϵ)-approximation schemes
Journal of Computer and System Sciences ( IF 1.1 ) Pub Date : 2020-07-21 , DOI: 10.1016/j.jcss.2020.07.001
Supachai Mukdasanit , Sanpawat Kantabutra

Let M=(T,C,P) be a security model, where T is a rooted tree, C is a multiset of costs and P is a multiset of prizes and let (T,c,p) be a security system, where c and p are bijections of costs and prizes. The problems of computing an optimal attack on a security system and of determining an edge eE(T) such that the maximum sum of prizes obtained from an optimal attack in (T,c,p) is minimized when c(e)= are considered. An O(G2n)-time algorithm to compute an optimal attack as well as an O(G2n2)-time algorithm to determine such an edge are given, in addition to a (1-ϵ) FPTAS with the time bound O(1ϵ2n3logG) and a (1+ϵ) FPTAS with the time bound O(1ϵ2n4logG) for the first and second problems, respectively.



中文翻译:

分层网络安全模型及其(1± ϵ)近似方案中的攻击和防御 

中号=ŤCP是一个安全模型,其中T是一棵有根的树,C是多个成本集合,P是多个奖赏集合,ŤCp是一个安全系统,其中cp是成本和奖金的双射。计算对安全系统的最佳攻击并确定边缘的问题ËËŤ 这样,从最佳攻击中获得的最大奖金额 ŤCp 被最小化 CË=被考虑。一个ØG2ñ时间算法来计算最佳攻击以及 ØG2ñ2除了带有时间限制的(1- ϵ)FPTAS外,还给出了确定这种边缘的实时算法Ø1个ϵ2ñ3日志G和(1+ ϵ)FPTAS并有时间限制Ø1个ϵ2ñ4日志G 分别针对第一个和第二个问题。

更新日期:2020-07-21
down
wechat
bug