A Decision-support Model for Information Systems Based on Situational Awareness

被引:4
作者
Hu He [1 ]
Wang Xiaojing [1 ]
Yang Xin [2 ]
机构
[1] Beijing Inst Technol, Lab Comp Network Def Technol, Beijing 100081, Peoples R China
[2] Comframe Software Beijing Corp, Beijing, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
situational awareness; decision making; Bayesian game; Bayesian Nash equilibrium;
D O I
10.1109/MINES.2009.130
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The research proposed an approach that based on situational awareness to make decisions about the protection and defense against cyber attacks. The statistics of the situational awareness system outputs were formalized and described. Strategy sets of each player were set according to the system states. Cost-benefit factors were considered comprehensively to calculate the payoffs of each player. The best strategy is determined based on Bayesian Nash equilibrium. On one hand, the best strategy was based on the working status of network system and critical equipments; on the other hand the payoffs of the players were calculated comprehensively. The model deals well with the attack's intents and the alternation of strategies, and takes account of incentives of system and attacker across-the-board. The experimental results show that the model can effectively improve the accuracy and effectiveness of network defense.
引用
收藏
页码:405 / +
页数:2
相关论文
共 9 条
[1]  
BASS T, 2000, P COMM ACM, P99, DOI DOI 10.1145/332051.332079
[2]  
CARVER A, 2000, P IEEE SYST MAN CYB, P110
[3]  
Lakkaraju Kiran., 2004, VIZSECDMSEC 04, P65, DOI DOI 10.1145/1029208.1029219
[4]  
LIU F, 2004, P 3 INT C INF SEC TA, P244, DOI DOI 10.1145/1046290.1046349
[5]  
LYE K, 2002, FDN COMP SEC WORKSH, P71, DOI DOI 10.1007/S10207-004-0060-X
[6]  
Mu CP, 2004, PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P1789
[7]   Efficient minimum-cost network hardening via exploit dependency graphs [J].
Noel, S ;
Jajodia, S ;
O'Berry, B ;
Jacobs, M .
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, :86-95
[8]  
SUDIT M, 2005, P SOC PHOTO-OPT INS, P114, DOI DOI 10.1117/12.606980
[9]  
Wei HQ, 2005, PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, P506