A A Survey of Interdependent Information Security Games

نویسندگان

  • ARON LASZKA
  • MARK FELEGYHAZI
  • LEVENTE BUTTYAN
چکیده

Information security has traditionally been considered a strategic cat-and-mouse game between the defending party and “the attacker”. The goal of the attacker has been to compromise the defender’s systems and to profit from this unauthorized access, while the goal of the defender has been to prevent unauthorized access to and usage of resources. In this game, both the attacker and the defender have traditionally been focusing on developing new technology to achieve their goals. Especially on the defense side, a traditional approach in information security is to enhance security technologies to reduce the number of vulnerabilities, hence attacks, and their impact on business operation. Even though the defenses are getting more efficient and protecting more users [Microsoft 2011], the total number of attacks is increasing globally. This trend can mostly be accounted to the increasing number of devices connected to the Internet, and consequently to the increasing interdependence of information systems. Attackers exploit this strong interdependence by launching and operating their attacks on a large-scale from countries where operating costs are reduced and law enforcement is weak. Although the proportion of protected users [Microsoft 2011] is increasing, the equally increasing number of unprotected computer systems leaves ample space to the attackers for exploitation. In addition to interdependence, available security information is highly asymmetric and strongly favors the attackers. A fundamental bias is that attackers only need to exploit one vulnerability of the targeted system, while the defender has to protect as many threat vectors as possible. Attackers can – and often do – proactively test their attack methods offline, but due to the number of attack possibilities, the defenders have a difficult time to patch systems proactively [Anderson 2001]. Moreover, the possibility of using illegal methods gives attackers a broader range of options than defenders. Finally, the “physics” of security changes over time new classes of attacks are being discovered and this dynamics keeps security researchers and practitioners alert.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Interdependent Security Games

Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions. Game theory is the most appropriate method to model the strat...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks

We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model due to Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomizedstrategy. We adapt I...

متن کامل

Interdependent Security Games Under Behavioral Probability Weighting

We consider a class of interdependent security games where the security risk experienced by a player depends on her own investment in security as well as the investments of other players. In contrast to much of the existing work that considers risk neutral players in such games, we investigate the impacts of behavioral probability weighting by players while making security investment decisions....

متن کامل

Interdependent Defense Games with Applications to Internet Security at the Level of Autonomous Systems

We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model by Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomized-strategy. We adapt IDS ...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014