A game theoretic framework for evaluation of the impacts of hackers diversity on security measures

被引:11
|
作者
Moayedi, Behzad Zare [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran 1684613114, Iran
关键词
Security; Modelling; Quantitative security evaluation; Markov chains; Game theory; SYSTEMS; STRATEGY; DEFENSE; SERIES;
D O I
10.1016/j.ress.2011.11.001
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of intelligent agents. However, it is necessary to revise these approaches if there is a community of hackers with significant diversity in their behaviours. In this paper, we introduce a novel approach to extend the basic ideas of applying game theory in stochastic modelling. The proposed method classifies the community of hackers based on two main criteria used widely in hacker classifications, which are motivation and skill. We use Markov chains to model the system and compute the transition rates between the states based on the preferences and the skill distributions of hacker classes. The resulting Markov chains can be solved to obtain the desired security measures. We also present the results of an illustrative example using the proposed approach, which examines the relation between the attributes of the community of hackers and the security measures. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 50 条
  • [31] Measures of attention to diversity: legislative framework, characteristics, analysis and evaluation
    Teresa Gonzalez, Ma
    Mendez Garcia, Rosa Ma
    Rodriguez Entrena, Ma Jesus
    [J]. PROFESORADO-REVISTA DE CURRICULUM Y FORMACION DE PROFESORADO, 2009, 13 (03): : 79 - 105
  • [32] A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
    Pirani, Mohammad
    Nekouei, Ehsan
    Sandberg, Henrik
    Johansson, Karl Henrik
    [J]. 2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 114 - 119
  • [33] A Game Theoretic Recommendation System for Security Alert Dissemination
    Alpcan, Tansu
    Liu, Xing
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 51 - +
  • [34] Game theoretic modeling of security and trust relationship in cyberspace
    Njilla, Laurent Yamen
    Pissinou, Niki
    Makki, Kia
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1500 - 1512
  • [35] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [36] A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems
    Pirani, Mohammad
    Nekouei, Ehsan
    Sandberg, Henrik
    Johansson, Karl Henrik
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (07) : 3699 - 3706
  • [37] Game-Theoretic Centrality Measures for Weighted Graphs
    Mazalov, V. V.
    Avrachenkov, K. E.
    Trukhina, L. I.
    Tsynguev, B. T.
    [J]. FUNDAMENTA INFORMATICAE, 2016, 145 (03) : 341 - 358
  • [38] Game Theoretic Modeling of Security and Interdependency in a Public Cloud
    Kamhoua, Charles A.
    Kwiat, Luke
    Kwiat, Kevin A.
    Park, Joon S.
    Zhao, Ming
    Rodriguez, Manuel
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 515 - 522
  • [39] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [40] A game theoretic approach to cyber security risk management
    Musman, Scott
    Turner, Andrew
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145