Efficient network security as a strategic game

被引:0
作者
Schlake, Fari [1 ]
Mili, Lamine [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
strategic form games; mechanism design theory; game theory; incentive compatibility; dominant strategy; protocol design; cyber security; performance optimisation; network management;
D O I
10.1504/IJCIS.2013.054968
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We implement game and mechanism design theories to develop a network-wide autonomous consumer-centric and delay-efficient security protocol, DSIC-S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network-wide socially desirable and Pareto optimal. DSIC-S guarantees the delivery of consumer's security services within desired levels, naturally and trustfully, reinforced by our nesting security model. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. We incorporate a valuation system to integrate the caused delay at each node in selection of security algorithms without consumer's knowledge of the actual delays. We achieve this by incorporating our valuation system, in particular that of the consumer's, in the calculation of the credit transfers with Vickrey-Clarke-Groves (VCG) payments and Clarke's pivotal rule. We prove that DSIC-S design solves the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory. We propose an incentive model and incorporate the valuations in these incentives. The simulations validate our theoretical results. They prove the significance of our model and show the correlation of the credit transfers to actual delays and security valuations.
引用
收藏
页码:243 / 273
页数:31
相关论文
共 50 条
  • [31] Game Theoretic Modeling of Security and Interdependency in a Public Cloud
    Kamhoua, Charles A.
    Kwiat, Luke
    Kwiat, Kevin A.
    Park, Joon S.
    Zhao, Ming
    Rodriguez, Manuel
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 515 - 522
  • [32] Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security
    Asefi-Ghamari, Hamidreza
    Hassani, Murtadha
    Mahgoub, Imad
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [33] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774
  • [34] Strategic Partnership of Independent States as a Game
    Haskova, Simona
    [J]. INNOVATIVE ECONOMIC SYMPOSIUM 2017 (IES2017): STRATEGIC PARTNERSHIP IN INTERNATIONAL TRADE, 2017, 39
  • [35] Security First, Security by Design, or Security Pragmatism - Strategic Roles of IT Security in Digitalization Projects
    Guggenmos, Florian
    Haeckel, Bjorn
    Ollig, Philipp
    Stahl, Bastian
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [36] Game Theoretical Modelling of Network/Cybersecurity
    Iqbal, Azhar
    Gunn, Lachlan J.
    Guo, Mingyu
    Babar, M. Ali
    Abbott, Derek
    [J]. IEEE ACCESS, 2019, 7 : 154167 - 154179
  • [37] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    [J]. ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
  • [38] Password Security as a Game of Entropies
    Rass, Stefan
    Koenig, Sandra
    [J]. ENTROPY, 2018, 20 (05)
  • [39] Dynamic Awareness and Strategic Adaptation in Cybersecurity: A Game-Theory Approach
    Kostelic, Katarina
    [J]. GAMES, 2024, 15 (02):
  • [40] Piggyback Game: Efficient Event Stream Dissemination in Online Social Network Systems
    Zhang, Fan
    Chen, Hanhua
    Jin, Hai
    [J]. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2016,