【24h】

Game Theory Meets Information Security Management

机译:博弈论与信息安全管理相遇

获取原文

摘要

This work addresses the challenge "how do we make better security decisions?" and it develops techniques to support human decision making and algorithms which enable well-founded cyber security decisions to be made. In this paper we propose a game theoretic model which optimally allocates cyber security resources such as administrators' time across different tasks. We first model the interactions between an omnipresent attacker and a team of system administrators seen as the defender, and we have derived the mixed Nash Equilibria (NE) in such games. We have formulated general-sum games that represent our cyber security environment, and we have proven that the defender's Nash strategy is also minimax. This result guarantees that independently from the attacker's strategy the defender's solution is optimal. We also propose Singular Value Decomposition (SVD) as an efficient technique to compute approximate equilibria in our games. By implementing and evaluating a minimax solver with SVD, we have thoroughly investigated the improvement that Nash defense introduces compared to other strategies chosen by common sense decision algorithms. Our key finding is that a particular NE, which we call weighted NE, provides the most effective defense strategy. In order to validate this model we have used real-life statistics from Hackmageddon, the Verizon 2013 Data Breach Investigation report, and the Ponemon report of 2011. We finally compare the game theoretic defense method with a method which implements a stochastic optimization algorithm.
机译:这项工作解决了“我们如何做出更好的安全决策?”这一挑战。并且它开发了支持人工决策和算法的技术,从而可以做出有根据的网络安全决策。在本文中,我们提出了一种博弈论模型,该模型可以最佳地分配网络安全资源(例如管理员在不同任务上的时间)。我们首先对无所不在的攻击者与被视为防御者的系统管理员团队之间的交互进行建模,然后得出此类游戏中的混合Nash均衡(NE)。我们制定了代表我们的网络安全环境的一般性博弈游戏,并且我们证明了防御者的Nash策略也是minimax。该结果保证了独立于攻击者的策略,防御者的解决方案是最佳的。我们还提出奇异值分解(SVD)作为一种有效的技术来计算游戏中的近似平衡。通过使用SVD实现和评估minimax求解器,我们彻底研究了Nash防御与常识决策算法选择的其他策略相比所带来的改进。我们的主要发现是,特定的网元(称为加权网元)提供了最有效的防御策略。为了验证该模型,我们使用了来自Hackmageddon,Verizon 2013数据泄露调查报告和2011年Ponemon报告的真实统计数据。最后,我们将博弈论防御方法与实现随机优化算法的方法进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号