Title :
Security Risk Evaluation of Information Systems Based on Game Theory
Author :
Hengwei Zhang ; Jihong Han ; Jian Zhang ; Jindong Wang
Author_Institution :
Zhengzhou Inst. of Inf. Sci. & Technol., Zhengzhou, China
Abstract :
To ensure the security of information systems, security risk have to be accurately evaluate first. Because security risk is influenced by attackers and defenders, it is necessary to consider the costs and benefits of both sides. However, the current evaluation methods mostly focus on one side. To solve the problem, in this paper we propose a security risk evaluation model Based on complete information static game (SRE-CSG). The SRE-CSG model represents the interaction and mutual influence of both sides´ strategies in the confrontation. On the basis of the SRE-CSG model, we present an improved payoff calculation method. The method takes into account the cost parameters and benefit parameters, and therefore be able to more accurately calculate the payoff. By analyzing Nash equilibrium strategy of information security game, an algorithm is designed to evaluate security risk value. The risk value derived from the algorithm is Based on equilibrium strategy of attackers and defenders, so it is more comprehensive and accurate. The SRE-CSG model and the algorithm can provide theoretical support for the efficient information systems security protection. The example analysis proves the effectiveness of the model and algorithm.
Keywords :
cost-benefit analysis; game theory; information systems; risk analysis; security of data; Nash equilibrium strategy; SRE-CSG model; attackers; benefit parameters; complete information static game; confrontation; cost parameters; defenders; game theory; information security game; information system security protection; information systems; payoff calculation method; security risk evaluation model; security risk value; Algorithm design and analysis; Analytical models; Atomic measurements; Game theory; Games; Information systems; Security; Game theory; Nash equilibrium; Risk evaluation; Security risk domain;
Conference_Titel :
Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2013 5th International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-0-7695-5011-4
DOI :
10.1109/IHMSC.2013.18