Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets

被引:15
|
作者
Hota, Ashish R. [1 ]
Clements, Abraham A. [1 ]
Sundaram, Shreyas [1 ]
Bagchi, Saurabh [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
D O I
10.1007/978-3-319-47413-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a game-theoretic framework to compute optimal and strategic security investments by multiple defenders. Each defender is responsible for the security of multiple assets, with the inter-dependencies between the assets captured by an interdependency graph. We formulate the problem of computing the optimal defense allocation by a single defender as a convex optimization problem, and establish the existence of a pure Nash equilibrium of the game between multiple defenders. We apply our proposed framework in two case studies on interdependent SCADA networks and distributed energy resources, respectively. In particular, we investigate the efficiency loss due to decentralized defense allocations.
引用
收藏
页码:101 / 113
页数:13
相关论文
共 50 条
  • [1] Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
    Abdallah, Mustafa
    Naghizadeh, Parinaz
    Hota, Ashish R.
    Cason, Timothy
    Bagchi, Saurabh
    Sundaram, Shreyas
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1585 - 1596
  • [2] GAME-THEORETIC OPTIMAL PORTFOLIOS
    BELL, R
    COVER, TM
    [J]. MANAGEMENT SCIENCE, 1988, 34 (06) : 724 - 733
  • [3] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [4] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    [J]. Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [5] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [6] Analyzing information system investments: A game-theoretic approach
    Butterfield, J
    Pendegraft, N
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2001, 18 (03) : 73 - 82
  • [7] Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security
    Asefi-Ghamari, Hamidreza
    Hassani, Murtadha
    Mahgoub, Imad
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [8] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774
  • [9] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [10] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304