Advertisement

A Review of Several Optimization Problems Related to Security in Networked System

  • Bhaskar DasGuptaEmail author
  • Venkatkumar Srinivasan
Chapter
Part of the Springer Optimization and Its Applications book series (SOIA, volume 113)

Abstract

Security issues are becoming more and more important to activities of individuals, organizations, and the society in our modern networked computerized world. In this chapter we survey a few optimization frameworks for problems related to security of various networked system such as the internet or the power grid system.

Keywords

Security Networked system Optimization framework 

Notes

Acknowledgements

The authors were partially supported by NSF grant IIS-1160995.

References

  1. 1.
    A. Abur, A. Expósito, Power System State Estimation (Marcel Dekker, Inc., New York, 2004)CrossRefGoogle Scholar
  2. 2.
    R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T. Overbye, Detecting false data injection attacks on dc state estimation, in 1st Workshop on Secure Control Systems (2010)Google Scholar
  3. 3.
    S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge University Press, Cambridge, 2004)CrossRefzbMATHGoogle Scholar
  4. 4.
    K. Bringmann, T. Friedrich, F. Neumann, M. Wagner, Approximation-guided evolutionary multi-objective optimization, 22nd International Joint Conference on Artificial Intelligence, pp. 1198–1203 (2011)Google Scholar
  5. 5.
    G. Dán, H. Sandberg, Stealth attacks and protection schemes for state estimators in power systems, 1st IEEE International Conference on Smart Grid Communications, pp. 214–219 (2010)Google Scholar
  6. 6.
    K. Deb, S. Agrawal, A. Pratap, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evolut. Comput. 6 (2), 182–197 (2002)CrossRefGoogle Scholar
  7. 7.
    D.M. Dunlavy, B. Hendrickson, T.G. Kolda, Mathematical challenges in cybersecurity. Technical Report SAND2009-0805, Sandia National Laboratories (2009)Google Scholar
  8. 8.
    F.M.D. Fave, R. Stranders, A. Rogers, N.R. Jennings, Bounded decentralised coordination over multiple objectives, 10th International Conference on Autonomous Agents and Multiagent Systems, pp. 371–378 (2011)Google Scholar
  9. 9.
    S. Floyd, V. Paxson, Difficulties in simulating the Internet. IEEE/ACM Trans. Netw. 9 (4), 392–403 (2001)CrossRefGoogle Scholar
  10. 10.
    D. Fudenberg, J. Tirole, Game Theory (MIT Press, Cambridge, 1991)zbMATHGoogle Scholar
  11. 11.
    P. Godfrey, R. Shipley, J. Gryz, Algorithms and analyses for maximal vector computation. VLDB J. 16, 5–28 (2006)CrossRefGoogle Scholar
  12. 12.
    H.T. Kung, F. Luccio, F.P. Preparata, On finding the maxima of a set of vectors. J. ACM 22 (4), 469–476 (1975)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Y. Liu, M. Reiter, P. Ning, False data injection attacks against state estimation in electric power grids, 16th ACM Conference on Computer and Communication Security, pp. 21–32 (2009)Google Scholar
  14. 14.
    T. Matsui, M. Silaghi, K. Hirayama, M. Yokoo, H. Matsuo, Distributed search method with bounded cost vectors on multiple objective dcops, in 15th International Conference on Principles and Practice of Multi-Agent Systems, pp. 137–152 (2012)Google Scholar
  15. 15.
    J. Meza, S. Campbell, D. Bailey, Mathematical and Statistical Opportunities in Cyber Security. Report LBNL-1667E, Lawrence Berkeley National Laboratory (2009)Google Scholar
  16. 16.
    P. Modi, W.-M. Shen, M. Tambe, M. Yokoo, ADOPT: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161 (1–2), 149–180 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    A. Monticelli, State Estimation in Electric Power Systems A Generalized Approach (Kluwer Academic Publishers, Boston, 1999)CrossRefGoogle Scholar
  18. 18.
    T. Okimoto, N. Ikegai, K. Inoue, H. Okada, T. Ribeiro, H. Maruyama, Cyber security problem based on multi-objective distributed constraint optimization technique, in 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, pp. 1–7 (2013)Google Scholar
  19. 19.
    V. Paxson, Strategies for sound internet measurement, in 4th ACM SIGCOMM Conference on Internet measurement, pp. 263–271 (2004)Google Scholar
  20. 20.
    H. Sandberg, A. Teixeira, K.H. Johansson, On security indices for state estimators in power networks, in 1st Workshop on Secure Control Systems (2010).Google Scholar
  21. 21.
    A.J. Slagell, K. Lakkaraju, K. Luo, Flaim: A multi-level anonymization framework for computer and network logs, in 20th USENIX Large Installation System Administration Conference, pp. 63–77 (2006)Google Scholar
  22. 22.
    K.C. Sou, H. Sandberg, K.H. Johansson, On the exact solution to a smart grid cyber-security analysis problem. IEEE Trans. Smart Grid 4 (2), 856–865 (2013)CrossRefGoogle Scholar
  23. 23.
    K.G. Vamvoudakis, J.P. Hespanha, R.A. Kemmerer, G. Vigna, Formulating cyber-security as convex optimization problems, in Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol. 449 (Springer, Berlin, 2013), pp. 85–100Google Scholar
  24. 24.
    G. Vigna, The 2011 UCSB iCTF: Description of the game (2011), http://ictf.cs.ucsb.edu/ Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of Illinois at ChicagoChicagoUSA

Personalised recommendations