Information Security Resource Allocation Using Evolutionary Game
نویسندگان
چکیده
Abstract Based on the discussion of related concepts and technical theories, information security resource allocation influencing factors index system is constructed from four aspects: resources, threat sources, vulnerabilities measures. With further analysis their affecting mechanisms, basic theoretical framework established based evolutionary game. Under this framework, subject relationship in various situations analyzed. This research work can conduct a reasonable resources to security.
منابع مشابه
Evolutionary Dynamics of Resource Allocation in the Colonel Blotto Game
We provide an evolutionary game-theoretical formulation for a model of resource allocation—the Colonel Blotto game. In this game, two players with different total resources must entirely distribute them among a set of items. Each item is won by the player that assigned higher resources to it, and the payoff of each player is the total number of won items. Our evolutionary formulation makes it p...
متن کاملUrban Security: Game-Theoretic Resource Allocation in Networked Physical Domains
Law enforcement agencies frequently must allocate limited resources to protect targets embedded in a network, such as important buildings in a city road network. Since intelligent attackers may observe and exploit patterns in the allocation, it is crucial that the allocations be randomized. We cast this problem as an attacker-defender Stackelberg game: the defender’s goal is to obtain an optima...
متن کاملGame-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information
Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker wi...
متن کاملPortfolio approach to information technology security resource allocation decisions
This paper presents a portfolio optimization approach to information technology (IT) security investment decisions in an organization. This approach has been motivated by the extreme variations that are found in IT security requirements for organizations in addition to the diversity of starting conditions found in organizations that choose to embark on a formal approach to managing their securi...
متن کاملNetwork Resource Allocation and A Congestion Game
We explore the properties of a congestion game where users of a congested resource anticipate the effect of their actions on the price of the resource. When users are sharing a single resource, we show existence and uniqueness of the Nash equilibrium, and establish that the aggregate utility received by the users is at least 3/4 of the maximum possible aggregate utility. We also consider extens...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Electrical Engineering
سال: 2022
ISSN: ['1876-1100', '1876-1119']
DOI: https://doi.org/10.1007/978-981-19-2456-9_43