On the reliability of a voting system under cyber attacks

被引:6
|
作者
Li, Yijia [1 ]
Hu, Xiaoxiao [1 ]
Zhao, Peng [2 ]
机构
[1] Lanzhou Univ, Ctr Data Sci, Sch Math & Stat, Lanzhou, Peoples R China
[2] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple attacks; Poisson process; Stochastic order; Truncated normal distribution; OPTIMIZATION; REDUNDANCY;
D O I
10.1016/j.ress.2021.107996
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Voting systems have been widely used in many areas due to their technical decision making abilities. However, when a voting system operates on any internet platform, it faces a number of potential vulnerabilities including malware and denial of service attacks. In this work, we study the reliability of a majority voting system under cyber threats. Three multiple attack scenarios are considered including targeted, random, and dynamic attacks. We show that under some conditions, the reliability of a voting system decreases with the number of attacked voting components for the targeted attacks; however, for the random attacks, the reliability of a voting system can increase with the number of attacked voting components. For the dynamic attacks, it is discovered that the reliability of a voting system is significantly impacted by the attack rate and the random proposition time. We further develop efficient algorithms for computing the reliability of voting systems which can be employed in practice.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] On the reliability of a voting system under cyber attacks
    Li, Yijia
    Hu, Xiaoxiao
    Zhao, Peng
    Reliability Engineering and System Safety, 2021, 216
  • [2] Investigating the Impact of Cyber Attacks on Power System Reliability
    Zhang, Yichi
    Wang, Lingfeng
    Sun, Weiqing
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 462 - +
  • [3] Models of reliability of fault-tolerant software under cyber-attacks
    Popov, Peter
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 228 - 239
  • [4] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [5] Monitoring system reaction in cyber-physical testbed under cyber-attacks
    Bernieri, Giuseppe
    Miciolino, Estefania Etcheves
    Pascucci, Federica
    Setola, Roberto
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 86 - 98
  • [6] Reliability of the voting engineering system under failure-dependence
    Zhang, P.
    Wang, G.Y.
    Jisuan Lixue Xuebao/Chinese Journal of Computational Mechanics, 2001, 18 (02):
  • [7] Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
    Liu, Xin-Rui
    Meng, Yuan
    Chang, Peng
    COMPLEXITY, 2021, 2021
  • [8] Cyber-Physical Power System (CPPS) Reliability Assessment Considering Cyber Attacks against Monitoring Functions
    Guo, Jia
    Wang, Yifei
    Guo, Chuangxin
    Dong, Shufeng
    Wen, Baijian
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [9] Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components
    Abu Al-Haija, Qasem
    Brahma, Swastik
    2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
  • [10] Reliability Assessment of Distribution Network Considering Cyber Attacks
    Chen, Biyun
    Lu, Zhi
    Zhou, Hengwang
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018,