Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Apart from mechanisms to make crowd-sourcing secure, the reliability of a collaborative system is dependent on the economic incentives of its potential contributors. We study several factors related to the incentives in a community-based security system, including the expectation on the social influence and the contagion effect of generosity. We also investigate the effects of organizing community...
Role based trust management is capable of handling the dynamicity and uncertainty of security in multi-domain distributed environment. The interactions between trust domains and users can be modeled as Bayesian games in which both players have their own strategies and payoffs. This paper shows how Game Theory can be a tool to analyze the behaviors of every player in role based trust framework. We...
Growing interest in information security technologies and security investments has resulted in many studies analyzing the information security investment process of firms and individuals. Existing studies, however, have focused on illustrating the behavior of a defender or an attacker unilaterally rather than observing the interaction of two players simultaneously. This study, therefore, expands the...
Task scheduling and resource allocation are the crucial issues in any large scale distributed system, such as Computational Grids (CGs). However, traditional computational models and resolution methods cannot effectively tackle the complex nature of Grid, where the resources and users belong to many administrative domains with their own access policies, users' privileges, etc. Recently, researchers...
During the first decade of this century, the online games are developed rapidly in China. But the virtual items transaction problems hinder the development of online games. Traditional trading models cannot meet the demand of both security and convenience at the same time. In order to improve the traditional transaction models, this paper presents a more secure transaction platform by embedding a...
In the past few years, social networking websites such as Facebook and Myspace become very popular. The usage rage of social networking websites even exceeds that of Google. Followed by the popularity is many potential networking threats. How to prevent and improve these threats to avoid their expansion has become a major challenge. This paper categorizes social networking websites into three main...
Decision-makers want to perform risk-based cost-benefit prioritization of security investments. However, strong nonlinearities in the most common physical security performance metric make it difficult to use for cost-benefit analysis. This paper extends the definition of risk for security applications and embodies this definition in a new but related security risk metric based on the degree of difficulty...
We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process, where players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations...
This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defender or Intruder-Administrator in simulated cyber warfare. Given a network environment, attack graphs are defined in an anticipation game framework to generate action strategies by analyzing (local/global) vulnerabilities and security measures. The proposed approach extends an anticipation game (AG)...
Gold farming is a set of illicit practices in which players in massively multiplayer online games gather and distribute virtual goods for real money. Using anonymized data from a popular online game to construct networks of characters involved in gold farming, we examine the trade networks of gold farmers, their trading affiliates, and uninvolved characters at large. Our analysis of these complex...
In recent years, the security of P2P networks has become increasingly obvious, it is accompanied by the continuous development of these networks. This paper analyzes and contrasts the earnings of the nodes which based on the nodes behavior of selfishness and betrayal, therefore the penalty factor is presented for the P2P game model. After reasonable analysis and the simulation by gambit, it is proved...
Area of interests (AOI) filter plays a vital role in reducing the network traffic in peer-to-peer (P2P) based massively multiplayer online games (MMOGs). However, not every peer in the system can be completely trusted. Secret information, such as players' positions are vulnerable to be disclosed in traditional AOI filtering and such cheating is hard to detect. We propose a protocol, called SAFE, based...
This paper proposes a method to identify network vulnerability based on Monte Carlo sampling and game theory. A two-player (attacker vs. immunizer), non-cooperative, constant-sum game model is used to obtain a mixed Nash equilibrium strategy. In this strategy, each node has a probability of being selected by the immunizer. These probabilities reflect the vulnerabilities of network nodes. With the...
Quantitative models for security risk management in organizations are recently receiving an increased attention in the research community. This paper investigates the possibility of cooperation among autonomous divisions of an organization with dependent security assets and/or vulnerabilities for reducing overall security risks. A coalitional game is formulated for modeling cooperation possibilities...
It is an important factor for the honeypot decoy system to accurately analyze on intrusion information and precisely locate them. As there are some conflict and cooperation relationship among the collected data by honeypot system, it needs to fuse the honey information so that normal decision can be made for intrusions. The paper regarded the fusion process of honeypot information as game process...
We study two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process. Players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations...
We study randomized fingerprinting codes that achieve the fundamental capacity limits subject to the so-called Boneh-Shaw marking assumption. Two decoding schemes are studied in particular: the joint decoder is capacity-achieving but computationally intense, while the simple decoder is suboptimal but efficient. We provide tight bounds as well as numerical results for capacities and study the difference...
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection of attacks is far from trivial. There exists a tradeoff between security enforcement levels and the performance of information systems. It is critical to configure an IDS in a dynamic and iterative fashion to balance the...
The use of game theory has introduced new insights in quantitative evaluation of security and dependability. Currently, there is a wide range of useful game theoretic approaches to model the behavior of intelligent agents. However, it is necessary to revise these approaches if there is a society of hackers with significant diversity in their behaviors. In this paper, we introduce a novel approach...
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors of email users in the email worm propagation process. The game situation models the actions of the email users under the condition that at the time they open an attachment, the system...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.