Threshold FlipThem: When the winner does not need to take all.

作者: David Leslie , Nigel P. Smart , Chris Sherfield

DOI:

关键词:

摘要: We examine a FlipIt game in which there are multiple resources monolithic attacker is trying to compromise. This extension was considered paper GameSec 2014, and called FlipThem. Our analysis of such situation focused on the where attacker’s goal compromise threshold resources. use our theoretic model enable defender choose correct configuration (number threshold) so as ensure that it makes no sense for rational adversary try attack system. selection made basis relative costs defender.

参考文章(12)
Quanyan Zhu, Tamer Başar, Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense decision and game theory for security. pp. 246- 263 ,(2013) , 10.1007/978-3-319-02786-9_15
Viet Pham, Carlos Cid, Are We Compromised? Modelling Security Assessment Games decision and game theory for security. pp. 234- 247 ,(2012) , 10.1007/978-3-642-34266-0_14
Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi, Cybersecurity Games and Investments: A Decision Support Approach decision and game theory for security. pp. 266- 286 ,(2014) , 10.1007/978-3-319-12601-2_15
Aron Laszka, Benjamin Johnson, Jens Grossklags, Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game decision and game theory for security. pp. 175- 191 ,(2013) , 10.1007/978-3-319-02786-9_11
M. Patrick Collins, A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses decision and game theory for security. pp. 221- 233 ,(2012) , 10.1007/978-3-642-34266-0_13
Harkeerat Bedi, Sajjan Shiva, Sankardas Roy, A game inspired defense mechanism against distributed denial of service attacks Security and Communication Networks. ,vol. 7, pp. 2389- 2404 ,(2014) , 10.1002/SEC.949
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu, A Survey of Game Theory as Applied to Network Security hawaii international conference on system sciences. pp. 1- 10 ,(2010) , 10.1109/HICSS.2010.35
Rafail Ostrovsky, Moti Yung, How to withstand mobile virus attacks (extended abstract) Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91. pp. 51- 59 ,(1991) , 10.1145/112600.112605
Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, FlipIt: The Game of Stealthy Takeover Journal of Cryptology. ,vol. 26, pp. 655- 713 ,(2013) , 10.1007/S00145-012-9134-5
Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, A game theoretic framework for evaluation of the impacts of hackers diversity on security measures Reliability Engineering & System Safety. ,vol. 99, pp. 45- 54 ,(2012) , 10.1016/J.RESS.2011.11.001