A Hypergame Model for Information Security

نویسنده

  • Yadigar Imamverdiyev
چکیده

Game theory is one of the most powerful mathematical tools to model information security decision-making. However, in game theory it is assumed that all the players have complete knowledge about each player’s strategies, preferences, and decision rules used. This assumption is very strong, in reality there is often significant information asymmetry between players. In many real world situations, decision-makers do not always have all the information about each player’s true intentions, strategies or preferences. Consequently, they have to perceive the situation from their own points of view, and may err in their perceptions. Since the early developments of game theory attempts have been made to incorporate misperceptions in game models of either incomplete or imperfect information. However, most of these attempts are based on quantities (as probabilities, risk factors, etc.) that are very difficult to compute in real world applications. In this paper, we consider a special family of games of incomplete information called hypergames. Hypergame theory extends classical game theory with the ability to deal with differences in players' misperceptions. In the context of hypergames, few works have addressed the study of information security decision making. The proposed two level hypergame models defender’s and attacker’s perception of the information security situation can be considered as a series of games. KeywordsInformation security; decision-making; game theory; hypergame.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hypergame Theory for DTGT Agents

In this work, hypergame theory has been extended to record decision theoretic and game theoretic information in a single table, called the hypergame normal form. A twoplayer, zero-sum, single-stage hypergame has been provided in this paper to describe a decision-making situation. Hypergame expected utility is introduced as an embellished concept of expected utility that provides an estimate of ...

متن کامل

Modeling Deception In Information Security As A Hypergame – A Primer

Hypergames are a branch of game theory used to model and analyze game theoretic conflicts between multiple players who may have misconceptions of the other players’ actions or preferences. They have been used to model military con­ flicts such as the Allied invasion of Normandy in 1945 [19], the fall of France in WWII [5], and the Cuban missile cri­ sis [7]. Unlike traditional game theory model...

متن کامل

Advances in Hypergame Theory

This articles reprises findings from hypergame work in Vane’s doctoral dissertation [Vane 2000] that are directly applicable to decision-theoretic (DT) and game-theoretic (GT), or simply, DTGT agents. Hypergame theory meets many of the methodological requirements for bounded rationality agent research. While this early hypergame work considered expected value and worst case scenarios (from adve...

متن کامل

PROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

PROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014