Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Network Security Situation Awareness Approach Based on Markov Game Model
基于Markov 博弈模型的网络安全态势感知方法

ZHANG Yong,TAN Xiao-Bin,CUI Xiao-Lin,XI Hong-Sheng,

软件学报 , 2011,
Abstract: To analyze the influence of propagation on a network system and accurately evaluate system security, this paper proposes an approach to improve the awareness of network security, based on the Markov Game Model (MGM). This approach gains a standard data of assets, threats, and vulnerabilities via fusing a variety of system security data collected by multi-sensors. For every threat, it analyzes the rule of propagation and builds a threat propagation network (TPN). By using the Game Theory to analyze the behaviors of threats, administrators, and ordinary users, it establishes a three player MGM. In order to make the evaluation process a real-time operation, it optimizes the related algorithm. The MGM can dynamically evaluate system security situation and provide the best reinforcement schema for the administrator. The evaluation of a specific network indicates that the approach is suitable for a real network environment, and the evaluation result is precise and efficient. The reinforcement schema can effectively curb the propagation of threats.
The Game Model for Reducing the Security Risk of Chinese Commercial Bank

QIAO Li-xin,YUAN Ai-ling,LI Shu-xia,FENG Ying-jun,

系统工程理论与实践 , 2006,
Abstract: In order to investigate the game behind the hackers and commercial banks,this paper analyzes the costs and profits about the attack and the defense of commercial banks & hackers,and studies the game status of hackers and commercial banks by signal game model.This paper figures that commercial banks should maintain its reputation at a higher level to prevent hacker's attack,and thus let the hacker to believe the profit will less than the average direct cost while making an attack.Regarding the cost,rational commercial banks may hope its marginal profit gained by the engagement in its reputation promotion equals to the banks' lose due to hacker's attack.This paper finally concluded that,the supervisor authorities should try to increase the inspection frequency about the status of commercial banks' network security,as well as increase the media exposing level about the losing status caused by network information security risk,and thus force the commercial banks to increase its investment on network security.
A Game Semantics for Generic Polymorphism  [PDF]
Samson Abramsky,Radha Jagadeesan
Computer Science , 2013,
Abstract: Genericity is the idea that the same program can work at many different data types. Longo, Milstead and Soloviev proposed to capture the inability of generic programs to probe the structure of their instances by the following equational principle: if two generic programs, viewed as terms of type $\forall X. \, A[X]$, are equal at any given instance $A[T]$, then they are equal at all instances. They proved that this rule is admissible in a certain extension of System F, but finding a semantically motivated model satisfying this principle remained an open problem. In the present paper, we construct a categorical model of polymorphism, based on game semantics, which contains a large collection of generic types. This model builds on two novel constructions: -- A direct interpretation of variable types as games, with a natural notion of substitution of games. This allows moves in games A[T] to be decomposed into the generic part from A, and the part pertaining to the instance T. This leads to a simple and natural notion of generic strategy. -- A "relative polymorphic product" which expresses quantification over the type variable X in the variable type A with respect to a "universe'" which is explicitly given as an additional parameter B. We then solve a recursive equation involving this relative product to obtain a universe in a suitably "absolute" sense. Full Completeness for ML types (universal closures of quantifier-free types) is proved for this model.
Mean-field-game model for Botnet defense in Cyber-security  [PDF]
Vassili Kolokoltsov,Alain Bensoussan
Mathematics , 2015,
Abstract: We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents. We introduce a simple mean-field game that models their behavior. It takes into account both the random process of the propagation of the infection (controlled by the botner herder) and the decision making process of customers. Its stationary version turns out to be exactly solvable (but not at all trivial) under an additional natural assumption that the execution time of the decisions of the customers (say, switch on or out the defence system) is much faster that the infection rates.
Cyber-Physical Security: A Game Theory Model of Humans Interacting over Control Systems  [PDF]
Scott Backhaus,Russell Bent,James Bono,Ritchie Lee,Brendan Tracey,David Wolpert,Dongping Xie,Yildiray Yildiz
Computer Science , 2013,
Abstract: Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices represents a potential access point for an intruder spurring research into intruder prevention and detection. However, no security measures are complete, and intruding attackers will compromise smart grid devices leading to the attacker and the system operator interacting via the grid and its control systems. The outcome of these machine-mediated human-human interactions will depend on the design of the physical and control systems mediating the interactions. If these outcomes can be predicted via simulation, they can be used as a tool for designing attack-resilient grids and control systems. However, accurate predictions require good models of not just the physical and control systems, but also of the human decision making. In this manuscript, we present an approach to develop such tools, i.e. models of the decisions of the cyber-physical intruder who is attacking the systems and the system operator who is defending it, and demonstrate its usefulness for design.
Closing the Price of Anarchy Gap in the Interdependent Security Game  [PDF]
Parinaz Naghizadeh,Mingyan Liu
Computer Science , 2013,
Abstract: The reliability and security of a user in an interconnected system depends on all users' collective effort in security. Consequently, investments in security technologies by strategic users is typically modeled as a public good problem, known as the Interdependent Security (IDS) game. The equilibria for such games are often inefficient, as selfish users free-ride on positive externalities of others' contributions. In this paper, we present a mechanism that implements the socially optimal equilibrium in an IDS game through a message exchange process, in which users submit proposals about the security investment and tax/price profiles of one another. This mechanism is different from existing solutions in that (1) it results in socially optimal levels of investment, closing the Price of Anarchy gap in the IDS game, (2) it is applicable to a general model of user interdependencies. We further consider the issue of individual rationality, often a trivial condition to satisfy in many resource allocation problems, and argue that with positive externality, the incentive to stay out and free-ride on others' investment can make individual rationality much harder to satisfy in designing a mechanism.
A Study of Protection the Information Security on the Internet of Things Based on Game Theory
Shanshan Li,Wei Jiang,Tianfa Jiang
Transactions on Computer Science and Technology , 2012,
Abstract: Firstly, this paper introduces the technology for the Internet of Things and the characteristics of information security, and discusses the needs of security related the internet of things. This method based on combination of the dependency strategy between the attacker and defender is proposed for protection the internet information security. Secondly , a set of effective security system model which ensure the interests of defenders based on game theory is proposed. The research results demonstrate that the system gives the best response decision strategy, and the strategy for in the face of attack. It is conducive to the analysis of practical problems and provides a new reference for the integrity of the information security system of the Internet of Things.
IT Security Issues Within the Video Game Industry  [PDF]
Stephen Mohr,Syed Shawon Rahman
Computer Science , 2011, DOI: 10.5121/ijcsit.2011.3501
Abstract: IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small. While each of these organizations will never be exactly the same as the next, there are common security issues that can and do affect each and every video game company. In order to properly address those security issues, one of the current leading video game companies was selected in order to perform an initial security assessment. This security assessment provided a starting point upon which specific goals and procedures were determined to help mitigate those risks. The information contained within was initially completed on the case study but has been generalized to allow the information to be easily applied to any video game company.
A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries  [PDF]
Nicola Gatti,Mattia Monga,Sabrina Sicari
Computer Science , 2010, DOI: 10.1109/ICUMT.2010.5676623
Abstract: Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node localization. In particular, we analyze the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model this scenario as a two-player game. We analyze the optimal players' strategy and we show that the VM is indeed a proper mechanism to reduce fake positions.
It Security Issues Within the Video Game Industry  [PDF]
International Journal of Computer Science & Information Technology , 2011,
Abstract: IT security issues are an important aspect for each and every organization within the video gameindustry. Within the video game industry alone, you might not normally think of security risks being anissue. But as we can and have seen in recent news, no cbig or how small. While each of thesecommon security issues that can and doaddress those security issues,one of the current leading videoperform an initial security assessment.specific goals and procedures werewithin was initially completed on the case study but has beeneasily applied to any video game company
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.