Information Security Resource Allocation Using Evolutionary Game

نویسندگان

چکیده

Abstract Based on the discussion of related concepts and technical theories, information security resource allocation influencing factors index system is constructed from four aspects: resources, threat sources, vulnerabilities measures. With further analysis their affecting mechanisms, basic theoretical framework established based evolutionary game. Under this framework, subject relationship in various situations analyzed. This research work can conduct a reasonable resources to security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolutionary Dynamics of Resource Allocation in the Colonel Blotto Game

We provide an evolutionary game-theoretical formulation for a model of resource allocation—the Colonel Blotto game. In this game, two players with different total resources must entirely distribute them among a set of items. Each item is won by the player that assigned higher resources to it, and the payoff of each player is the total number of won items. Our evolutionary formulation makes it p...

متن کامل

Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains

Law enforcement agencies frequently must allocate limited resources to protect targets embedded in a network, such as important buildings in a city road network. Since intelligent attackers may observe and exploit patterns in the allocation, it is crucial that the allocations be randomized. We cast this problem as an attacker-defender Stackelberg game: the defender’s goal is to obtain an optima...

متن کامل

Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information

Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker wi...

متن کامل

Portfolio approach to information technology security resource allocation decisions

This paper presents a portfolio optimization approach to information technology (IT) security investment decisions in an organization. This approach has been motivated by the extreme variations that are found in IT security requirements for organizations in addition to the diversity of starting conditions found in organizations that choose to embark on a formal approach to managing their securi...

متن کامل

Network Resource Allocation and A Congestion Game

We explore the properties of a congestion game where users of a congested resource anticipate the effect of their actions on the price of the resource. When users are sharing a single resource, we show existence and uniqueness of the Nash equilibrium, and establish that the aggregate utility received by the users is at least 3/4 of the maximum possible aggregate utility. We also consider extens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Electrical Engineering

سال: 2022

ISSN: ['1876-1100', '1876-1119']

DOI: https://doi.org/10.1007/978-981-19-2456-9_43