A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors

被引:3
|
作者
Moayedi, Behzad Zare [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Performance & Dependabil Engn Lab, Tehran, Iran
关键词
Game theory; Markov chains; security; dependability; quantitative security evaluation; RISK;
D O I
10.1109/DASC.2009.157
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The most serious problem in the area of quantitative security evaluation is modeling of hacker's behavior. Because of the intelligent and complicated mental aspects of hackers, there are many challenges to model their behavior. Recently, there have been some efforts to use game theory for predicting hacker's behavior. However, it is necessary to revise the proposed approaches if there is a society of hackers with significant diversity in their behaviors. In this paper, we have examined our newly introduced approach to extend the basic ideas of using game theory to predict transition rates in stochastic models. The proposed method categorizes the society of hackers based on two main criteria used widely in hacker classification: motivations and skills. Markov chains are used to model the system. Based on the preferences of each class of hackers and the distribution of skills in each class, the transition rates between the states are computed. The resulting Markov chains can be solved to obtain the corresponding security measures of the system. We have explored some of the applications of the method and have shown that the method facilitates the study of relationships between important factors of hackers/defenders societies and different security measures of the system.
引用
收藏
页码:508 / 513
页数:6
相关论文
共 50 条
  • [1] A game theoretic framework for evaluation of the impacts of hackers diversity on security measures
    Moayedi, Behzad Zare
    Azgomi, Mohammad Abdollahi
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 99 : 45 - 54
  • [2] A game-theoretic approach to stochastic security and dependability evaluation
    Sallhammar, Karin
    Helvik, Bjarne E.
    Knapskog, Sven J.
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 61 - +
  • [3] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [4] A game-theoretic approach to optimize the Time-of-Use pricing considering customer behaviors
    Cui, Weiwei
    Li, Lin
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2018, 201 : 75 - 88
  • [5] A game theoretic approach to cyber security risk management
    Musman, Scott
    Turner, Andrew
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145
  • [6] A Game Theoretic Approach to Integrate Security with Quality of Service
    Fadlullah, Zubair Md
    Vasilakos, Athanasios V.
    Kato, Nei
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [7] Security of Vehicle Platooning: A Game-Theoretic Approach
    Basiri, Mohammad Hossein
    Pirani, Mohammad
    Azad, Nasser L.
    Fischmeister, Sebastian
    [J]. IEEE ACCESS, 2019, 7 : 185565 - 185579
  • [8] A differential game approach to information security investment under hackers' knowledge dissemination
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. OPERATIONS RESEARCH LETTERS, 2013, 41 (05) : 421 - 425
  • [9] A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations
    Moayedi, Behzad Zare
    Azgomi, Mohammad Abdollahi
    [J]. 2009 THIRD UKSIM EUROPEAN SYMPOSIUM ON COMPUTER MODELING AND SIMULATION (EMS 2009), 2009, : 552 - 557
  • [10] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    [J]. 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,