Game Theory Meets Information Security Management

被引:0
作者
Fielder, Andrew [1 ]
Panaousis, Emmanouil [2 ]
Malacaria, Pasquale [2 ]
Hankin, Chris [1 ]
Smeraldi, Fabrizio [2 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Queen Mary Univ London, London, England
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
Information security management; game theory; cyber security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work addresses the challenge "how do we make better security decisions?" and it develops techniques to support human decision making and algorithms which enable well-founded cyber security decisions to be made. In this paper we propose a game theoretic model which optimally allocates cyber security resources such as administrators' time across different tasks. We first model the interactions between an omnipresent attacker and a team of system administrators seen as the defender, and we have derived the mixed Nash Equilibria (NE) in such games. We have formulated general-sum games that represent our cyber security environment, and we have proven that the defender's Nash strategy is also minimax. This result guarantees that independently from the attacker's strategy the defender's solution is optimal. We also propose Singular Value Decomposition (SVD) as an efficient technique to compute approximate equilibria in our games. By implementing and evaluating a minimax solver with SVD, we have thoroughly investigated the improvement that Nash defense introduces compared to other strategies chosen by common sense decision algorithms. Our key finding is that a particular NE, which we call weighted NE, provides the most effective defense strategy. In order to validate this model we have used real-life statistics from Hackmageddon, the Verizon 2013 Data Breach Investigation report, and the Ponemon report of 2011. We finally compare the game theoretic defense method with a method which implements a stochastic optimization algorithm.
引用
收藏
页码:15 / 29
页数:15
相关论文
共 10 条
[1]  
Acquisti A., 2003, P 2 ANN WORKSH EC IN, V3
[2]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[3]  
Grossklags Jens., 2008, PROCEEDING 17 INT C, P209
[4]  
Hankin C., 2013, LNCS, V7860, P69
[5]  
Johnson B., 2012, LNICST, V75, P444
[6]  
Kannan R., 2005, ECON THEOR, V42, P157
[7]  
Kiekintveld C., 2013, P 2013 INT C AUT AG, P231
[8]  
Kiekintveld Christopher, 2009, P 8 INT C AUTONOMOUS, V1, P689, DOI DOI 10.1017/CB09780511973031.008
[9]   Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness [J].
Korzhyk, Dmytro ;
Yin, Zhengyu ;
Kiekintveld, Christopher ;
Conitzer, Vincent ;
Tambe, Milind .
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2011, 41 :297-327
[10]  
Lye K W, 2005, INT J INF SECUR, V4, P71, DOI DOI 10.1007/S10207-004-0060-X