Modelling and Analysis of Network Security - an Algebraic Approach

被引:0
|
作者
Zhang, Qian [1 ]
Jiang, Ying [1 ]
Wu, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing, Peoples R China
关键词
Network security; Nash equilibria strategies; Formal method; Probabilistic value-passing CCS;
D O I
10.1109/TrustCom.2017.77
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating Systems (CCS), which is a common formal language for modeling concurrent systems. Our approach gives a uniform security model for different security scenarios. We present then a uniform algorithm for computing the Nash equilibria strategies on this security model. In a nutshell, the algorithm first generates a network state transition graph for our security model, then simplifies this transition graph through graph-theoretic abstraction and bisimulation minimization. Then, a backward induction method, which is only applicable to finite tree models, can be used to compute all the Nash equilibria strategies of the (possibly infinite) security models. This algorithm is implemented and can be tuned smoothly for computing its social optimal strategies, and its termination and correctness are proved. The effectiveness and efficiency of this approach are demonstrated with two detailed examples from the field of network security.
引用
收藏
页码:308 / 315
页数:8
相关论文
共 50 条
  • [31] Security modelling for risk analysis
    Kwok, LF
    Longley, D
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 29 - 45
  • [32] An algebraic approach for modelling organisation, roles and contexts in MAS
    Omicini, A
    Ricci, A
    Viroli, M
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2005, 16 (2-3) : 151 - 178
  • [33] An algebraic approach for modelling organisation, roles and contexts in MAS
    Andrea Omicini
    Alessandro Ricci
    Mirko Viroli
    Applicable Algebra in Engineering, Communication and Computing, 2005, 16 : 151 - 178
  • [34] Adaptive observer design based on an algebraic modelling approach
    Department of Automation, Tsinghua University, Beijing
    100084, China
    Hsi An Chiao Tung Ta Hsueh, 7 (88-91):
  • [35] On scalability and modularisation in the modelling of network security systems
    de Albuquerque, JP
    Krumm, H
    de Geus, PL
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 287 - 304
  • [36] An algebraic approach to multiresolution analysis
    Foote, R
    TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, 2005, 357 (12) : 5031 - 5050
  • [37] AN ALGEBRAIC APPROACH TO PERFORMANCE ANALYSIS
    MULLERWICHARDS, D
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 295 : 159 - 185
  • [38] Deterministic Network Model Revisited: An Algebraic Network Coding Approach
    Erez, Elona
    Kim, MinJi
    Xu, Yun
    Yeh, Edmund M.
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (08) : 4867 - 4879
  • [39] Network Modulation: An Algebraic Approach to Enhancing Network Data Persistence
    Ma, Xiaoli
    Choi, Giwan
    Zhang, Wei
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [40] Network Modulation: An Algebraic Approach to Enhancing Network Data Persistence
    Xiaoli Ma
    Giwan Choi
    Wei Zhang
    EURASIP Journal on Wireless Communications and Networking, 2010