Network Security Validation Using Game Theory

نویسندگان

  • Vicky Papadopoulou Lesta
  • Andreas Gregoriades
چکیده

Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks’ infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a gametheoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Two-tier Supplier Base Efficiency Evaluation Via Network DEA: A Game Theory Approach

In today's competitive markets, firms try to reduce their supply cost by selecting efficient suppliers using different techniques. Several methods can be applied to evaluate the efficiency of supplier base. This paper develops generalized network data envelopment analysis models to examine the efficiency of two-tier supplier bases under cooperative and non-cooperative strategies where each tier...

متن کامل

Game Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network

Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...

متن کامل

finding influential individual in Social Network graphs using CSCS algorithm and shapley value in game theory

In recent years, the social networks analysis gains great deal of attention. Social networks have various applications in different areas namely predicting disease epidemic, search engines and viral advertisements. A key property of social networks is that interpersonal relationships can influence the decisions that they make. Finding the most influential nodes is important in social networks b...

متن کامل

Biding Strategy in Restructured Environment of Power Market Using Game Theory

In the restructured environment of electricity market, firstly the generating companies and the customers are looking for maximizing their profit and secondly independent system operator is looking for the stability of the power network and maximizing social welfare. In this paper, a one way auction in the electricity market for the generator companies is considered in both perfect and imperfec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009