Designing Rating Systems to Promote Mutual Security for Interconnected Networks

نویسندگان

  • Jie Xu
  • Yu Zhang
  • Mihaela van der Schaar
چکیده

—Interconnected autonomous systems (ASs) often share security risks. However, an AS lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, we develop a systematic and rigorous framework for analyzing and significantly improving the mutual security of a collection of ASs that interact frequently over a long period of time. Using this framework, we show that simple incentive schemes based on rating systems can be designed to encourage the ASs' security investments, thereby significantly improving their mutual security. When designing the optimal rating systems, we explicitly consider that monitoring the ASs' investment actions is imperfect and that the cyber-environment exhibits unique characteristics. An important consideration in this design is the heterogeneity of ASs in terms of both generated traffic and underlying connectivity. Our analysis shows that the optimal strategy recommended to the ASs on whether to make or not security investments emerges as a tradeoff between the performance gains achieved by ensuring the AS's compliance with the recommended strategy and the efficiency loss induced by the imperfect monitoring. When the monitoring errors are sufficiently small or the traffic and connectivity structure of the AS collection exhibits the " Maximal Critical Traffic (MCT) " property (i.e. the critical traffic of the whole collection is no less than that of any subset of the AS collection), it is optimal to recommend all ASs to make security investments. However, when this network property is not satisfied, an improved performance can be achieved when some ASs are recommended to NOT make security investments. Many simple network topologies (e.g. the complete, the " line " , the " star " graphs and etc.) exhibit the " MCT " property. However, a common topology on the Internet-the " core-periphery " topology-does not possess the " MCT " property and in this case, we prove that whether or not it is optimal to recommend all ASs to make security investments depends on the AS collection size. Even though this paper considers a simplified model of the interconnected ASs' security, our analysis provides important and useful insights for designing rating systems that can significantly improve the mutual security of real networks in a variety of practical scenarios.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Designing an Expert System for Credit Rating of Real Customers of Banks Using Fuzzy Neural Networks

Currently, in Iran's banking system, non-repayment of facilities has become one of the biggest issues, and due to the lack of a proper system for proper allocation of facilities, they face a number of problems, including the problem of allocation of loans, the problem of failure to repay loans Of the central bank, or the amount of facilities increased from the amount of reimbursement. The solut...

متن کامل

Designing a trust-based recommender system in Social Rating Networks

One of the most common styles of business today is electronic business, since it is considered as a principal mean for financial transactions among advanced countries. In view of the fact that due to the evolution of human knowledge and the increase of expectations following that, traditional marketing in electronic business cannot meet current generation’s needs, in order to survive, organizat...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1211.2287  شماره 

صفحات  -

تاریخ انتشار 2012