学位论文详细信息
Asymmetric information games and cyber security
Game theory;Asymmetric information games;Cyber security;Cyber-attack forecasting;Model predictive control;Stochastic games;Repeated games
Jones, Malachi G. ; Shamma, Jeff S. Electrical and Computer Engineering Fekri, Faramarz Egerstedt, Magnus Feron, Eric Blough, Doug ; Shamma, Jeff S.
University:Georgia Institute of Technology
Department:Electrical and Computer Engineering
关键词: Game theory;    Asymmetric information games;    Cyber security;    Cyber-attack forecasting;    Model predictive control;    Stochastic games;    Repeated games;   
Others  :  https://smartech.gatech.edu/bitstream/1853/50284/1/JONES-DISSERTATION-2013.pdf
美国|英语
来源: SMARTech Repository
PDF
【 摘 要 】

A cyber-security problem is a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that can each have competing objectives.In this thesis, we are interested in cyber-security problems where one decision maker has superior or better information. Game theory is a well-established mathematical tool that can be used to analyze such problems and will be our tool of choice. In particular, we will formulate cyber-security problems as stochastic games with asymmetric information, where game-theoretic methods can then be applied to the problems to derive optimal policies for each decision maker.A severe limitation of considering optimal policies is that these policies are computationally prohibitive. We address the complexity issues by introducing methods, based on the ideas of model predictive control, to compute suboptimal polices. Specifically, we first prove that the methods generate suboptimal policies that have tight performance bounds. We then show that the suboptimal polices can be computed by solving a linear program online, and the complexity of the linear program remains constant with respect to the game length. Finally, we demonstrate how the suboptimal policy methods can be applied to cyber-security problems to reduce the computational complexity of forecasting cyber-attacks.

【 预 览 】
附件列表
Files Size Format View
Asymmetric information games and cyber security 516KB PDF download
  文献评价指标  
  下载次数:23次 浏览次数:12次