A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory

被引:0
作者
Cotae, Paul [1 ]
Kang, Myong
Velazquez, Alexander [2 ]
机构
[1] Univ Dist Columbia, Sch Engn & Appl Sci, Elect & Comp Engn Dept, Washington, DC 20008 USA
[2] Naval Res Lab, Ctr High Assurance Comp Syst, Washington, DC 20375 USA
来源
2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM) | 2020年
关键词
game theory; decision-making; cybersecurity;
D O I
10.1109/comm48946.2020.9141991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new cybersecurity decision-making model based on game-theory and decision-making process. The proposed model allows the cyber defender to make optimal decisions by considering perceived damage, cost of potential defensive actions, and benefit to mission. We provide detailed examples and numerical results supporting our model to show how game theory can help the decision-making process for cybersecurity by focusing on situations of conflict between an attacker and a defender.
引用
收藏
页码:15 / 22
页数:8
相关论文
共 28 条
  • [1] Adbul-Nour G, 2016, **DROPPED REF**
  • [2] Aliprantis C.D., 2000, Games and Decision Making
  • [3] Dynamic Deception
    Anderson, Axel
    Smith, Lones
    [J]. AMERICAN ECONOMIC REVIEW, 2013, 103 (07) : 2811 - 2847
  • [4] [Anonymous], 2003, DECISION MAKING USIN
  • [5] [Anonymous], 1980, THEORY GAMES EC BEHA
  • [6] How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games
    Bao, Tiffany
    Shoshitaishvili, Yan
    Wang, Ruoyu
    Kruegel, Christopher
    Vigna, Giovanni
    Brumley, David
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 7 - 21
  • [7] A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks
    De Assis, Marcos V. O.
    Hamamoto, Anderson H.
    Abrao, Taufik
    Proenca, Mario Lemes, Jr.
    [J]. IEEE ACCESS, 2017, 5 : 9485 - 9496
  • [8] Etesami S.R., 2019, DYN GAMES APPL, DOI [10.1007/s13235-018-00291, DOI 10.1007/S13235-018-00291]
  • [9] Feng X., 2017, Decision and Game Theory for Security, P315
  • [10] Fuller R., 2010, DECISION MAKING UNCE