Modelling and Analysis of Network Security - an Algebraic Approach

被引:0
|
作者
Zhang, Qian [1 ]
Jiang, Ying [1 ]
Wu, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing, Peoples R China
关键词
Network security; Nash equilibria strategies; Formal method; Probabilistic value-passing CCS;
D O I
10.1109/TrustCom.2017.77
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating Systems (CCS), which is a common formal language for modeling concurrent systems. Our approach gives a uniform security model for different security scenarios. We present then a uniform algorithm for computing the Nash equilibria strategies on this security model. In a nutshell, the algorithm first generates a network state transition graph for our security model, then simplifies this transition graph through graph-theoretic abstraction and bisimulation minimization. Then, a backward induction method, which is only applicable to finite tree models, can be used to compute all the Nash equilibria strategies of the (possibly infinite) security models. This algorithm is implemented and can be tuned smoothly for computing its social optimal strategies, and its termination and correctness are proved. The effectiveness and efficiency of this approach are demonstrated with two detailed examples from the field of network security.
引用
收藏
页码:308 / 315
页数:8
相关论文
共 50 条
  • [1] Frailty modelling for risk analysis in network security and survivability
    Ma Z.S.
    International Journal of Information and Computer Security, 2011, 4 (03) : 276 - 294
  • [2] Algebraic approach for modelling and analysis of nonlinear hybrid dynamical systems
    Hajer, Bouzaouache
    youssef, Jmel
    Naceur, Benhadj Braiek
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1890 - +
  • [4] Security Enforcement by Rewriting: An Algebraic Approach
    Sui, Guangye
    Mejri, Mohamed
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 311 - 321
  • [5] A process algebraic approach to security policies
    Ryan, P
    Arnesen, RR
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 301 - 312
  • [6] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [7] Modelling and analysis of rule-based network security middleboxes
    Salah, Khaled
    Chaudary, Aslam
    IET INFORMATION SECURITY, 2015, 9 (06) : 305 - 312
  • [8] An algebraic approach to temporal network analysis based on temporal quantities
    Batagelj V.
    Praprotnik S.
    Social Network Analysis and Mining, 2016, 6 (01)
  • [9] An algebraic approach to network coding
    Koetter, R
    Médard, M
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2003, 11 (05) : 782 - 795
  • [10] Power network analysis using an adaptive algebraic multigrid approach
    Zhu, ZY
    Yao, B
    Cheng, CK
    40TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2003, 2003, : 105 - 108