Modelling and Analysis of Network Security - an Algebraic Approach

被引:0
|
作者
Zhang, Qian [1 ]
Jiang, Ying [1 ]
Wu, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing, Peoples R China
关键词
Network security; Nash equilibria strategies; Formal method; Probabilistic value-passing CCS;
D O I
10.1109/TrustCom.2017.77
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating Systems (CCS), which is a common formal language for modeling concurrent systems. Our approach gives a uniform security model for different security scenarios. We present then a uniform algorithm for computing the Nash equilibria strategies on this security model. In a nutshell, the algorithm first generates a network state transition graph for our security model, then simplifies this transition graph through graph-theoretic abstraction and bisimulation minimization. Then, a backward induction method, which is only applicable to finite tree models, can be used to compute all the Nash equilibria strategies of the (possibly infinite) security models. This algorithm is implemented and can be tuned smoothly for computing its social optimal strategies, and its termination and correctness are proved. The effectiveness and efficiency of this approach are demonstrated with two detailed examples from the field of network security.
引用
收藏
页码:308 / 315
页数:8
相关论文
共 50 条
  • [21] Modelling Distributed Network Security in a Petri Net- and Agent-Based Approach
    Adameit, Simon
    Betz, Tobias
    Cabac, Lawrence
    Hars, Florian
    Hewelt, Marcin
    Koehler-Bussmeier, Michael
    Moldt, Daniel
    Popov, Dimitri
    Quenum, Jose
    Theilmann, Axel
    Wagner, Thomas
    Warns, Timo
    Wuestenberg, Lars
    MULTIAGENT SYSTEM TECHNOLOGIES, 2010, 6251 : 209 - +
  • [22] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [23] An approach for network security analysis using logic exploitation graph
    Mao, Han-dong
    Zhang, Wei-Ming
    Feng, Chen
    2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 761 - +
  • [24] An ontology for modelling security: The Tropos approach
    Mouratidis, H
    Giorgini, P
    Manson, G
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2003, 2773 : 1387 - 1394
  • [25] Grid of security: a new approach of the network security
    Flauzac, Olivier
    Nolot, Florent
    Rabat, Cyril
    Steffenel, Luiz-Angelo
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 67 - 72
  • [26] Modelling and Analysis of Urban Traffic Noise System Using Algebraic Graph Theoretic Approach
    Singh, Daljeet
    Nigam, S. P.
    Agrawal, V. P.
    Kumar, Maneek
    ACOUSTICS AUSTRALIA, 2016, 44 (02) : 249 - 261
  • [27] Modelling and Analysis of Urban Traffic Noise System Using Algebraic Graph Theoretic Approach
    Daljeet Singh
    S. P. Nigam
    V. P. Agrawal
    Maneek Kumar
    Acoustics Australia, 2016, 44 : 249 - 261
  • [28] Approach of the security of enterprises' network
    Zheng, Y.-H.
    Huadong Chuanbo Gongye Xueyuan Xuebao/Journal of East China Shipbuilding Institute, 2001, 15 (05): : 32 - 36
  • [29] A Comprehensive Approach for Network Security
    Rm, Manikandan
    Radha, D.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
  • [30] Adaptive Approach to Network Security
    Ksiezopolski, Bogdan
    Kotulski, Zbigniew
    Szalachowski, Pawel
    COMPUTER NETWORKS, PROCEEDINGS, 2009, 39 : 233 - +