The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the actual situation of network attack and defense, a multi-stage attack-defense game model is formulated for the multi-stage attack-defense confrontation with the constraint of incomplete information. Considering that the network attack and defense has been developed rapidly and in real-time condition, the way that traditional discrete multi-stage game model has been used to analyze the...
Since traditional game theory applying to network attack and defense has the restriction of complete rational, we establish non-cooperative evolutionary game model of network attack and defense on the premise of bounded rationality, and solved by the replicator dynamic equations. For the strategy learning evolution process of defender, we use the Best-response dynamic learning mechanism to establish...
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
This paper proposes an agent-based simulation to analyze the effective resource allocation strategies for patrolling and inspection in consideration of urban network structures. A model of attackers and defenders is first formulated as “security game for urban networks.” Then optimal security plans are calculated as Nash equilibria, supposing complete rationality of attackers behaviors. The “rational”...
In wireless ad hoc networks (WANETs), collaboration among nodes is usually inefficient and the network is vulnerable to various attacks. Although some intrusion detection systems (IDSs) and reputation strategies have been proposed to enhance the network's robustness, the significant power consumption they cause will reduce the networks' lifetime. In this paper, we propose a power-efficient mechanism...
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating...
The diverse cyber attacks, that make operation of the smart grid challenging, must be addressed before wide adoption of smart grids can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the design of a specific defensive strategy to deal with a specific threat. In this paper we address the issue of...
It has been argued that systems that are comprised of similar components (i.e., a monoculture) are more prone to attacks than a system that exhibits diversity. But it is not currently clear how much diversity is needed and how to leverage the underlying diversity in the design space. In this paper, we present a game theoretic model to analyze strategic attack-defense scenarios as well as present our...
Investigation of the contradictory aspects of modern diplomacy is essential to a valid understanding of the working of the political system. Among these aspects, uncertainty infuses the norms of response to the conflicts. Iran's nuclear program is an example, which has intensified a lot of clashes in the region. Here, we develop a stylized strategic model to address the process of conflict resolution...
We study the evolution of action profiles played by players when they revise their actions using a simple better-reply update rule. We employ a continuous-time model, in which each player is allowed to update its strategy in accordance with a Poisson process. We demonstrate that when payoff information experiences no delay and players make decisions based on up-to-date information, action profiles...
RecDroid is a smartphone permission response recommendation system which utilizes the responses from expert users in the network to help inexperienced users. However, in such system, malicious users can mislead the recommendation system by providing untruthful responses. Although detection system can be deployed to detect the malicious users, and exclude them from recommendation system, there are...
Due to the resource-constraint features of LLNs and inherent vulnerabilities of RPL, the security design of deploying Intrusion Detection and Prevention System (IDPS) is widely used. However, IDPS has large energy consumption which is a major concern of LLNs. In order to protect LLNs and save energy resources, we propose an energy-efficient IDPS scheme using game theoretic framework, which analyze...
To ensure the security of information systems, security risk have to be accurately evaluate first. Because security risk is influenced by attackers and defenders, it is necessary to consider the costs and benefits of both sides. However, the current evaluation methods mostly focus on one side. To solve the problem, in this paper we propose a security risk evaluation model Based on complete information...
Cloud computing has attracted much interest recently from both industry and academic. However, it is difficult to construct perfectly secure mechanisms, in face of complex and various attack behaviors in cloud computing. In this paper, a stochastic game model (SGM) is proposed to describe the attack-defense behavior in cloud computing, the physical machine, attack-defense behavior and their attributes...
With the increase of network complexity and continuous development of network attack techniques, it is unrealistic to prevent network from attacks or intrusion threats absolutely, a large number of critical network services require that they can provide adequate qualities of services in the face of suffering intrusions or even certain parts of network system be destroyed. Therefore, network survivability...
In order to analyze the effect of different behaviors of quality control department and construction contractor on the construction project quality management model, an Nonmyopic game model of construction project quality management was established. In this model, the effect and position of social responsibility and fines were carefully discussed and the dynamic Nonmyopic procedure and stable equilibrium...
As the rapid development of modernization, the safety and reliability of power system operation become more and more important to us. According to the safety issues and accidents that occur in the daily operation of power system in China, this paper analyzes the strategy of our security supervision systems which act between security supervision department (SSD) and employees. A 3-player game-theoretic...
Online medicine sale is an important form of pharmaceutical enterprises in developing e-commerce. As the particularity of the medicine compared to other products, how the customer judge the quality of the medicine sold by online pharmacies have received special attentions. The paper analyzes the process of transactions between online pharmacies and customers using the method of signaling game and...
Paper analyzes and does the empirical research on the government intervention model of financial security. First, it analyzes the simple game premise of the incentive regulation of financial security. Second, it builds a simple game mode and explains the operational mechanism of the incentive regulation to analyze the difference between the incentive regulation model and cooperative game. Finally,...
Predicting security incidents and forecasting risk are two essential duties when designing an enterprise security system. Based on a quantitative risk assessment technique arising from an an attacker-defender model, we propose a Bayesian learning strategy to continuously update the quality of protection and forecast the decision-theoretic risk. Evidence for or against the security of particular system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.