Security via Strategic Randomization
نویسندگان
چکیده
The ARMOR (Assistant for Randomized Monitoring Over Routes) project has been developing methods for creating randomized plans and processes, so that even if an attacker observes the plans over time, he/she cannot predict its progression or how it will unfold in the future, thus providing risk reduction while guaranteeing a certain level of protection quality. Our key research accomplishments have been developing efficient algorithms to address the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or observe the patrolling strategy and use this to its advantage.
منابع مشابه
IRIS - A Tool for Strategic Security Allocation in Transportation Networks
Security is a concern of major importance to governments and companies throughout the world. With limited resources, complete coverage of potential points of attack is not possible. Deterministic allocation of available law enforcement agents introduces predictable vulnerabilities that can be exploited by adversaries. Strategic randomization is a game theoretic alternative that we implement in ...
متن کاملGGHLite: More Efficient Multilinear Maps from Ideal Lattices
The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible approximation to a cryptographic multilinear map. Unfortunately, using the security analysis in [10], the scheme requires very large parameters to provide security for its underlying “encoding re-randomization” process. Our main contributions are to formalize, simplify and improve the efficiency and the securit...
متن کاملEffective Entropy: Security-Centric Metric for Memory Randomization Techniques
User space memory randomization techniques are an emerging field of cyber defensive technology which attempts to protect computing systems by randomizing the layout of memory. Quantitative metrics are needed to evaluate their effectiveness at securing systems against modern adversaries and to compare between randomization technologies. We introduce Effective Entropy, a measure of entropy in use...
متن کاملStrategic Communication for Supporting Cyber-Security
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. F...
متن کاملGame-Theoretic Foundations for the Strategic Use of Honeypots in Network Security
An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determ...
متن کامل