科技报告详细信息
Modeling attacker-defender interactions in information networks.
Collins, Michael Joseph
关键词: GAME THEORY;    SIMULATION;    COMPUTER NETWORKS;   
DOI  :  10.2172/1008137
RP-ID  :  SAND2010-7046
PID  :  OSTI ID: 1008137
Others  :  TRN: US201108%%143
学科分类:社会科学、人文和艺术(综合)
美国|英语
来源: SciTech Connect
PDF
【 摘 要 】

The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

【 预 览 】
附件列表
Files Size Format View
RO201704240001252LZ 201KB PDF download
  文献评价指标  
  下载次数:0次 浏览次数:6次