Modelling and Analysis of Network Security - an Algebraic Approach

被引:0
|
作者
Zhang, Qian [1 ]
Jiang, Ying [1 ]
Wu, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing, Peoples R China
关键词
Network security; Nash equilibria strategies; Formal method; Probabilistic value-passing CCS;
D O I
10.1109/TrustCom.2017.77
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating Systems (CCS), which is a common formal language for modeling concurrent systems. Our approach gives a uniform security model for different security scenarios. We present then a uniform algorithm for computing the Nash equilibria strategies on this security model. In a nutshell, the algorithm first generates a network state transition graph for our security model, then simplifies this transition graph through graph-theoretic abstraction and bisimulation minimization. Then, a backward induction method, which is only applicable to finite tree models, can be used to compute all the Nash equilibria strategies of the (possibly infinite) security models. This algorithm is implemented and can be tuned smoothly for computing its social optimal strategies, and its termination and correctness are proved. The effectiveness and efficiency of this approach are demonstrated with two detailed examples from the field of network security.
引用
收藏
页码:308 / 315
页数:8
相关论文
共 50 条
  • [41] AN ALGEBRAIC POLYPHASE APPROACH TO WIRELESS NETWORK CODING
    Rajawat, Ketan
    Wang, Tairan
    Giannakis, Georgios B.
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 2441 - 2444
  • [42] Beyond routing:: An algebraic approach to network coding
    Koetter, R
    Médard, M
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 122 - 130
  • [43] NETSPEAK: An algebraic modelling language for nonconvex network optimization problems
    Lamar, BW
    Wallace, CA
    NETWORK OPTIMIZATION, 1997, 450 : 328 - 345
  • [44] A Formal Approach for Network Security Management Based on Qualitative Risk Analysis
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 244 - 251
  • [45] An Algebraic Approach for Evaluating Random Probing Security With Application to AES
    Jahandideh, Vahid
    Mennink, Bart
    Batina, Lejla
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (04): : 657 - 689
  • [46] SYMBOLIC NETWORK ANALYSIS - AN ALGEBRAIC FORMULATION
    SANNUTI, P
    PURI, NN
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1980, 27 (08): : 679 - 687
  • [47] TOPOLOGICAL NETWORK ANALYSIS BY ALGEBRAIC METHODS
    CHEN, WK
    MAXWELL, LM
    PROCEEDINGS OF THE INSTITUTION OF ELECTRICAL ENGINEERS-LONDON, 1967, 114 (01): : 86 - &
  • [48] AN ALTERNATIVE APPROACH FOR FORMULA MODELLING IN SECURITY METRICS
    Sanches Miani, Rodrigo
    Marques Pires, Felipe
    de Souza Mendes, Leonardo
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 381 - 386
  • [49] An Overview of Digital Security Forensics Approach and Modelling
    Hellany, A.
    Achi, H.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 257 - 260
  • [50] TOPOLOGICAL NETWORK ANALYSIS BY ALGEBRAIC METHODS
    MAXWELL, LM
    CLINE, JM
    PROCEEDINGS OF THE INSTITUTION OF ELECTRICAL ENGINEERS-LONDON, 1966, 113 (08): : 1344 - &