Designing Rating Systems to Promote Mutual Security for Interconnected Networks
نویسندگان
چکیده
—Interconnected autonomous systems (ASs) often share security risks. However, an AS lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, we develop a systematic and rigorous framework for analyzing and significantly improving the mutual security of a collection of ASs that interact frequently over a long period of time. Using this framework, we show that simple incentive schemes based on rating systems can be designed to encourage the ASs' security investments, thereby significantly improving their mutual security. When designing the optimal rating systems, we explicitly consider that monitoring the ASs' investment actions is imperfect and that the cyber-environment exhibits unique characteristics. An important consideration in this design is the heterogeneity of ASs in terms of both generated traffic and underlying connectivity. Our analysis shows that the optimal strategy recommended to the ASs on whether to make or not security investments emerges as a tradeoff between the performance gains achieved by ensuring the AS's compliance with the recommended strategy and the efficiency loss induced by the imperfect monitoring. When the monitoring errors are sufficiently small or the traffic and connectivity structure of the AS collection exhibits the " Maximal Critical Traffic (MCT) " property (i.e. the critical traffic of the whole collection is no less than that of any subset of the AS collection), it is optimal to recommend all ASs to make security investments. However, when this network property is not satisfied, an improved performance can be achieved when some ASs are recommended to NOT make security investments. Many simple network topologies (e.g. the complete, the " line " , the " star " graphs and etc.) exhibit the " MCT " property. However, a common topology on the Internet-the " core-periphery " topology-does not possess the " MCT " property and in this case, we prove that whether or not it is optimal to recommend all ASs to make security investments depends on the AS collection size. Even though this paper considers a simplified model of the interconnected ASs' security, our analysis provides important and useful insights for designing rating systems that can significantly improve the mutual security of real networks in a variety of practical scenarios.
منابع مشابه
Interdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملDesigning an Expert System for Credit Rating of Real Customers of Banks Using Fuzzy Neural Networks
Currently, in Iran's banking system, non-repayment of facilities has become one of the biggest issues, and due to the lack of a proper system for proper allocation of facilities, they face a number of problems, including the problem of allocation of loans, the problem of failure to repay loans Of the central bank, or the amount of facilities increased from the amount of reimbursement. The solut...
متن کاملDesigning a trust-based recommender system in Social Rating Networks
One of the most common styles of business today is electronic business, since it is considered as a principal mean for financial transactions among advanced countries. In view of the fact that due to the evolution of human knowledge and the increase of expectations following that, traditional marketing in electronic business cannot meet current generation’s needs, in order to survive, organizat...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1211.2287 شماره
صفحات -
تاریخ انتشار 2012