Academia.eduAcademia.edu

Outline

A Network Security Game Model

2015, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy

https://doi.org/10.1145/2699026.2699133

Abstract

There have been attempts to model the interaction between users, both malicious and benign, and network administrators as games. Building on such works, we here present a game model which is generic enough to capture various modes of such interactions. The model facilitates stochastic games with imperfect information. The imperfect information is due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over other multiple states, we use Euclidean distances between inputs from the sensors.

References (6)

  1. REFERENCES
  2. Lye, K. and Wing, J. 2005. Game Strategies in network security. International Journal of Information Security, vol. 4, no 1, pp. 71-86.
  3. Roy, S., Ellis, C. , Shiva, S., Dasgupta, D., Shandilya V. and Wu. Q. . . 2010. A survey of game theory as applied to network security. The 43 rd Hawaii International Conference on system Sciences.
  4. Shiva, S., Roy, S., Bedi, H., Dasgupta, D., and Wu. Q.. 2010. A stochastic game with imperfect information for cyber security. The 5 th International conference on i-warfare & security (ICIW), Dayton, Ohio.
  5. Simmons, C., Shiva, S., Bedi, H., and Shandilya. V. 2013. ADAPT: A game inspired attack-defense and performance metric taxonomy. Security and Privacy protection in Information Processing Systems, pp. 344-364. Springer Berlin Heidelberg.
  6. Simmons, C., Shiva, S., Phan, V., Shandilya, V. and Simmons, L. 2012. IRS: An issue resolution system for cyber-attack classification and management. SAM, Los Vegas, July.