Game Theory Based Optimization of Security Configuration

How to make a trade off between the security of sys- tems and the usability of users is an important issue in network security configuration. To resolve this problem, an optimization method of security configuration based on game theory is proposed. Firstly, a security configuration model based on non-cooperative game is built which in- fers the optimal strategy of systems and users respectively by calculating their strategies and incentives. Secondly, to optimize security configuration further, it cooperatively optimizes the individual optimal strategy by cooperative game, thus eliminating the cases that individual optimal is not the overall optimal. An illustrated experiment shows that this method can coordinate the security of network systems and usability of users so that the security configu- ration of system is optimized magnificently.

[1]  James Bret Michael,et al.  Use of an Experimental Policy Workbench: Description and Preliminary Results , 1991, DBSec.

[2]  Heiko Krumm,et al.  Policy modeling and refinement for network security systems , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[3]  Matthias Fuchs,et al.  Experiments in learning prototypical situations for variants of the pursuit game , 1999 .

[4]  Gong Jian-wei Genetic Algorithm Based Combinatorial Auction Method for Multi-Robot Task Allocation , 2007 .

[5]  Avishai Wool,et al.  Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Zengchang Qin,et al.  Naive Bayes Classification Given Probability Estimation Trees , 2006, 2006 5th International Conference on Machine Learning and Applications (ICMLA'06).

[7]  Chen-Nee Chuah,et al.  FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[8]  Avishai Wool,et al.  Firmato: A novel firewall management toolkit , 2004, TOCS.

[9]  James Bret Michael,et al.  Natural-language processing support for developing policy-governed software systems , 2001, Proceedings 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems. TOOLS 39.

[10]  Han Xue DISTRIBUTED CONTROL FOR GENERATING ARBITRARY FORMATION OF MULTIPLE ROBOTS , 2003 .

[11]  M. K. Goel,et al.  Assessing the vulnerability to soil erosion of the Ukai Dam catchments using remote sensing and GIS , 2002 .

[12]  Hiroaki Yamaguchi,et al.  A Cooperative Hunting Behavior by Mobile-Robot Troops , 1999, Int. J. Robotics Res..

[13]  Tong Liang Strategy of Cooperative Hunting by Multiple Mobile Robots , 2004 .

[14]  Tuomas Sandholm,et al.  An algorithm for optimal winner determination in combinatorial auctions , 1999, IJCAI 1999.

[15]  Eiichi Osawa,et al.  A Metalevel Coordination Strategy for Reactive Cooperative Planning , 1995, ICMAS.

[16]  Dean A. Scribner,et al.  Extending the normalized difference vegetation index (NDVI) to short-wave infrared radiation (SWIR) (1- to 2.5-μm) , 2002, SPIE Optics + Photonics.

[17]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .