Diversity and System Security: A Game Theoretic Perspective

被引:1
|
作者
Brahma, Swastik [1 ]
Kwiat, Kevin [2 ]
Varshney, Pramod K. [1 ]
Kamhoua, Charles [2 ]
机构
[1] Syracuse Univ, Dept EECS, Syracuse, NY 13244 USA
[2] Air Force Res Lab, Informat Directorate, Rome, NY USA
关键词
D O I
10.1109/MILCOM.2014.30
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
It has been argued that systems that are comprised of similar components (i.e., a monoculture) are more prone to attacks than a system that exhibits diversity. But it is not currently clear how much diversity is needed and how to leverage the underlying diversity in the design space. Here we attempt to study these issues using a Game Theoretic model comprised of multiple systems and an attacker. The model illustrates how the concept of the Nash Equilibrium provides a theoretical framework for designing strategic security solutions and how the mixed strategy solution space provides a conceptual basis for defining optimal randomization techniques that can exploit the underlying diversity. The paper also studies how strategic behavior influences the diversity and vulnerability of an overall system. Simulation results provide further insights into the effectiveness of our solution approach and the dynamics of strategic interaction in the context of system security.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [1] Consideration of Security for PLNC with Untrusted Relay in Game Theoretic Perspective
    Shirasaki, Yusuke
    Takyu, Osamu
    Fujii, Takeo
    Ohtsuki, Tomoaki
    Sasamori, Fumihito
    Handa, Shiro
    [J]. 2018 IEEE RADIO & WIRELESS SYMPOSIUM (RWS), 2018, : 109 - 112
  • [2] A Game Theoretic Recommendation System for Security Alert Dissemination
    Alpcan, Tansu
    Liu, Xing
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 51 - +
  • [3] A game theoretic framework for evaluation of the impacts of hackers diversity on security measures
    Moayedi, Behzad Zare
    Azgomi, Mohammad Abdollahi
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 99 : 45 - 54
  • [4] A game-theoretic framework for the security system of visible watermarking
    Tsai, Min-Jen
    Liu, Jung
    Wang, Chen-Sheng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5748 - 5754
  • [5] Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective
    Zhu, Yuyao
    Wu, Huici
    Tao, Xiaofeng
    Wang, Shen
    [J]. IEEE Internet of Things Journal, 2024, 11 (21) : 35048 - 35059
  • [6] Game Theoretic Analysis of Security and Sustainability
    An, Bo
    [J]. PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 5111 - 5115
  • [7] Game Theoretic Perspective of Optimal CSMA
    Jang, Hyeryung
    Yun, Se-Young
    Shin, Jinwoo
    Yi, Yung
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (01) : 194 - 209
  • [8] A Collaboration Scheme for Controlling Multimanipulator System: A Game-Theoretic Perspective
    Zhang, Jiazheng
    Jin, Long
    Wang, Yang
    Yang, Chenguang
    [J]. IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2023, 28 (01) : 128 - 139
  • [9] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [10] Game Theoretic Risk Analysis of Security Threats
    Li, J.
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2010, 61 (12) : 1795 - 1795