Efficient network security as a strategic game

被引:0
|
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
  • [1] Protecting shared information in networks: A network security game with strategic attacks
    de Witte, Bram
    Frasca, Paolo
    Overvest, Bastiaan
    Timmer, Judith
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4255 - 4277
  • [2] Game Theory for Network Security
    Liang, Xiannuan
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 472 - 486
  • [3] Making a game of network security
    Dougherty, M
    USENIX Association Proceedings of the Eighteenth Large Installation System Administration Conference, 2004, : 187 - 193
  • [4] Game strategies in network security
    Lye K.-W.
    Wing J.M.
    International Journal of Information Security, 2005, 4 (1-2) : 71 - 86
  • [5] Game Theory Meets Network Security
    Zhu, Quanyan
    Rass, Stefan
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2163 - 2165
  • [6] Distributed Strategic Learning with Application to Network Security
    Zhu, Quanyan
    Tembine, Hamidou
    Basar, Tamer
    2011 AMERICAN CONTROL CONFERENCE, 2011, : 4057 - 4062
  • [7] Network Security Validation Using Game Theory
    Papadopoulou, Vicky
    Gregoriades, Andreas
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 259 - 266
  • [8] A Survey of Game Theory as Applied to Network Security
    Roy, Sankardas
    Ellis, Charles
    Shiva, Sajjan
    Dasgupta, Dipankar
    Shandilya, Vivek
    Wu, Qishi
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 880 - 889
  • [9] Game Theory Meets Network Security and Privacy
    Manshaei, Mohammad Hossein
    Zhu, Quanyan
    Alpcan, Tansu
    Basar, Tamer
    Hubaux, Jean-Pierre
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [10] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64