Security via Strategic Randomization

نویسندگان

  • Milind Tambe
  • Fernando Ordonez
چکیده

The ARMOR (Assistant for Randomized Monitoring Over Routes) project has been developing methods for creating randomized plans and processes, so that even if an attacker observes the plans over time, he/she cannot predict its progression or how it will unfold in the future, thus providing risk reduction while guaranteeing a certain level of protection quality. Our key research accomplishments have been developing efficient algorithms to address the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or observe the patrolling strategy and use this to its advantage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IRIS - A Tool for Strategic Security Allocation in Transportation Networks

Security is a concern of major importance to governments and companies throughout the world. With limited resources, complete coverage of potential points of attack is not possible. Deterministic allocation of available law enforcement agents introduces predictable vulnerabilities that can be exploited by adversaries. Strategic randomization is a game theoretic alternative that we implement in ...

متن کامل

GGHLite: More Efficient Multilinear Maps from Ideal Lattices

The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible approximation to a cryptographic multilinear map. Unfortunately, using the security analysis in [10], the scheme requires very large parameters to provide security for its underlying “encoding re-randomization” process. Our main contributions are to formalize, simplify and improve the efficiency and the securit...

متن کامل

Effective Entropy: Security-Centric Metric for Memory Randomization Techniques

User space memory randomization techniques are an emerging field of cyber defensive technology which attempts to protect computing systems by randomizing the layout of memory. Quantitative metrics are needed to evaluate their effectiveness at securing systems against modern adversaries and to compare between randomization technologies. We introduce Effective Entropy, a measure of entropy in use...

متن کامل

Strategic Communication for Supporting Cyber-Security

The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. F...

متن کامل

Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security

An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008