رکورد قبلیرکورد بعدی

" A Game Theoretical Approach to Communication Security "


Document Type : Latin Dissertation
Language of Document : English
Record Number : 905666
Doc. No : TL3f59589r
Main Entry : Gueye, Assane
Title & Author : A Game Theoretical Approach to Communication Security\ Gueye, AssaneWalrand, Jean C
College : UC Berkeley
Date : 2011
student score : 2011
Abstract : The increased reliance on the Internet has made information and communication systems more vulnerable to security attacks.Many recent incidents demonstrate this vulnerability, such as the rapid propagation of sophisticated malwares, the fast growth of botnets, denial-of-service (DoS) attacks against business and government websites, and attacks against the power grid system.Experts must design and implement security solutions to defend against well organized and very sophisticated adversaries such as malicious insiders, cybercriminals, cyberterrorists, industrial spies, and, in some cases, nation-state intelligence agents.Instead of designing a defense against a specific attack, Game Theory attempts to design a defense against a sophisticated attacker who plans in anticipation of a complex defense. By including this `second-guessing' element into the design process, Game Theory has the potential of crafting improved security mechanisms. In addition, Game Theory can model issues of trust, incentives, and externalities that arise in security systems.This thesis illustrates the potential usefulness of Game Theory in security. By modeling the interactions between defenders and attackers as games in three types of common communication scenarios, we predict the adversaries' attacks, determine the set of assets that are most likely to be attacked, and suggest defense strategies for the defenders.The first example is a communication scenario where some components might be compromised. Specifically, we consider Bob who is receiving information that might be corrupted by an attacker, Trudy. We model the interaction between Trudy and Bob as a zero-sum game where Trudy chooses whether and how to corrupt the data and Bob decides how much he should trust the received information. By analyzing the Nash equilibrium of the game, we have determined when Bob should trust the received information, and how Trudy should corrupt the data. We have also shown how a <i>challenge-response</i> option for Bob candeter Trudy from corrupting the information.The second example is a scenario where an intelligent virus is attempting to infect a network protected by an Intrusion Detection System (IDS). The IDS detects intrusions by analyzing the volume of traffic going inside the network. We model the interaction of the intelligent virus and the IDS as a zero-sum game where the IDS chooses the detection threshold, while the virus is trying tochoose its infection rate to maximize its ultimate spreading.Using a Markov chain model, we compute the Nash equilibria of the game and analyze them. In general, a more aggressive virus is more damaging but is also faster to detect. Hence, in its best attack, the intelligent virus chooses an infection rate that balances betweenan aggressive attack that can be easily detected and a slow attack that causes less damage. The best defense strategy against such a sophisticated virus is to quarantine the traffic and analyze it prior to letting it go inside the network (in addition to setting the optimal threshold).The third example is a blocking security game. For this game, given a finite set of resources <i>S</i>, a defender needs to choose a feasible subset <i>T</i> of <i>S</i>of resources to perform a mission critical task. The attacker, at the same time, tries to disrupt the task by choosing one resource <i>e</i> of <i>S</i> to attack. Each resource <i>e</i> of <i>S</i> has a cost <i>&mu(e)</i> of attack. The defender loses some value <i>&lambda(T,e)</i> whenever the task is disrupted(i.e. the attacked resource <i>&me</i> belongs to his subset <i>&T</i>). This loss goes to the attacker. We analyze the game by using the combinatorial tools of blocking pairs of matrices (hence the name blocking security game).We introduce the notion of critical subset of resources and use this notion to define a vulnerability metric for the task. We find that, in Nash equilibrium, the attacker always targets a <i> critical set</i> of resources and the defender chooses a feasible subset that minimally intersects that critical subset. We illustrate the model with two examples of communication scenarios that consider design of network topology in the presence of a strategic adversary.The first example studies a scenario where a network manager is choosing a spanning tree of a graph while an attacker is trying to cut the tree by attacking one link of the graph. One of our findings in this scenario is that, the usual <i>edge-connectivity</i> metricfor a graph is not the appropriate vulnerability measure in a network where strategic adversaries are present. The second example deals with a <i>supply-demand</i> network where a network manager is choosing a feasible flow to transport the maximum amount of goods from a set of sources to a set of destinations,and an attacker is trying to minimize this by attacking an arc of the network. In this case, we find that critical subsets of links are cutsets that maximize the minimum fraction of goods carried per link of the cutset. In most cases, these correspond to minimum cutsets of the graph.Although computing Nash equilibria of a two-player game is generally complex, we have shown how, for a class of blocking games, one can compute a critical set of resources (hence a Nash equilibrium) in polynomial time.
Added Entry : Walrand, Jean C
Added Entry : UC Berkeley
کپی لینک

پیشنهاد خرید
پیوستها
عنوان :
نام فایل :
نوع عام محتوا :
نوع ماده :
فرمت :
سایز :
عرض :
طول :
3f59589r_14207.pdf
3f59589r.pdf
پایان نامه لاتین
متن
application/pdf
924.26 KB
85
85
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟