Title :
Game Theory Based Optimization of Security Configuration
Author :
Shi, Jin ; Lu, Yin ; Xie, Li
Abstract :
How to make a trade off between the security of sys- tems and the usability of users is an important issue in network security configuration. To resolve this problem, an optimization method of security configuration based on game theory is proposed. Firstly, a security configuration model based on non-cooperative game is built which in- fers the optimal strategy of systems and users respectively by calculating their strategies and incentives. Secondly, to optimize security configuration further, it cooperatively optimizes the individual optimal strategy by cooperative game, thus eliminating the cases that individual optimal is not the overall optimal. An illustrated experiment shows that this method can coordinate the security of network systems and usability of users so that the security configu- ration of system is optimized magnificently.
Keywords :
Computational intelligence; Feedback; Game theory; Information security; Laboratories; Natural languages; Optimization methods; Redundancy; Usability;
Conference_Titel :
Computational Intelligence and Security, 2007 International Conference on
Conference_Location :
Harbin, China
Print_ISBN :
0-7695-3072-9
Electronic_ISBN :
978-0-7695-3072-7
DOI :
10.1109/CIS.2007.25