基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users, both benign and malicious, and network administrators as games. Building on such works, we present a game model which is generic enough to capture various modes of such interactions. The model facilitates stochastic games with imperfect information. The information is imperfect due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over other multiple states, we use Euclidean distances between the outputs of the sensors. We build a 5-state game to represent the interaction of the administrator with the user. The states correspond to 1) the user being out of the system in the Internet, and after logging in to the system;2) having low privileges;3) having high privileges;4) when he successfully attacks and 5) gets trapped in a honeypot by the administrator. Each state has its own action set. We present the game with a distinct perceived action set corresponding to each distinct information set of these states. The model facilitates stochastic games with imperfect information. The imperfect information is due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over the states, we use Euclidean distances between outputs of the sensors. A numerical simulation of an example game is presented to show the evaluation of rewards to the players and the preferred strategies. We also present the conditions for formulating the strategies when dealing with more than one attacker and making collaborations.
推荐文章
基于WS-security的数据安全交换
端到端
WS-Security
SOAP消息
令牌
基于SOAP协议的Web Service 安全基础规范(WS-Security)
Web Service
WS-Security
安全规范
安全信息交换
SOAP协议扩展
Lyocell与Model织物风格比较
再生纤维素纤维
Lyocell织物
Model织物
风格特征
Zircon saturation model in silicate melts: a review and update
Zircon
Zircon saturation
Model
Silicate melt
Mafic to silicic melts
Peraluminous to peralkaline compositions
Igneous rocks
Thermometer
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 On a Generic Security Game Model
来源期刊 通讯、网络与系统学国际期刊(英文) 学科 医学
关键词 SECURITY System Architecture STOCHASTIC GAME General SUM GAME Imperfect Information NUMERICAL Simulation
年,卷(期) 2017,(7) 所属期刊栏目
研究方向 页码范围 142-172
页数 31页 分类号 R73
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2017(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
SECURITY
System
Architecture
STOCHASTIC
GAME
General
SUM
GAME
Imperfect
Information
NUMERICAL
Simulation
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
通讯、网络与系统学国际期刊(英文)
月刊
1913-3715
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
763
总下载数(次)
1
总被引数(次)
0
  • 期刊分类
  • 期刊(年)
  • 期刊(期)
  • 期刊推荐
论文1v1指导