Information Security Analysis Using Game Theory and Simulation
نویسنده
چکیده
Information security analysis can be performed using game theory implemented in dynamic simulations of Agent-Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players’ actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.
منابع مشابه
Biding Strategy in Restructured Environment of Power Market Using Game Theory
In the restructured environment of electricity market, firstly the generating companies and the customers are looking for maximizing their profit and secondly independent system operator is looking for the stability of the power network and maximizing social welfare. In this paper, a one way auction in the electricity market for the generator companies is considered in both perfect and imperfec...
متن کاملSimulation and Evaluation of Urban Development Scenarios Using Integration of Cellular Automata Model and Game Theory
Urban growth is a dynamic and evolutionary spatial and social process that relates to the changes of urban spatial units and the transformation of people’s lifestyles and consequently demographic changes. Considering the urban development process as a function of land uses interactions, population structure and the strategic behavior of the agents involved in the urban development process (the ...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملNGTSOM: A Novel Data Clustering Algorithm Based on Game Theoretic and Self- Organizing Map
Identifying clusters is an important aspect of data analysis. This paper proposes a noveldata clustering algorithm to increase the clustering accuracy. A novel game theoretic self-organizingmap (NGTSOM ) and neural gas (NG) are used in combination with Competitive Hebbian Learning(CHL) to improve the quality of the map and provide a better vector quantization (VQ) for clusteringdata. Different ...
متن کاملInvestigation of Game Between Cells in Occurrence of Genetic Mutations Using Evolutionary Game Theory
In this paper, two games that play a role in creating a cancer tumor and suppression are studied using evolutionary game theory and its different modes are analyzed. The first game is the competition between a cancer cell and a healthy cell to receive food through the blood. In the second game, the interaction between the two oncogenes Ras and Myc is examined for cellular deformation
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012