DocumentCode :
2565684
Title :
Game Theory Based Optimization of Security Configuration
Author :
Shi, Jin ; Lu, Yin ; Xie, Li
fYear :
2007
fDate :
15-19 Dec. 2007
Firstpage :
799
Lastpage :
803
Abstract :
How to make a trade off between the security of sys- tems and the usability of users is an important issue in network security configuration. To resolve this problem, an optimization method of security configuration based on game theory is proposed. Firstly, a security configuration model based on non-cooperative game is built which in- fers the optimal strategy of systems and users respectively by calculating their strategies and incentives. Secondly, to optimize security configuration further, it cooperatively optimizes the individual optimal strategy by cooperative game, thus eliminating the cases that individual optimal is not the overall optimal. An illustrated experiment shows that this method can coordinate the security of network systems and usability of users so that the security configu- ration of system is optimized magnificently.
Keywords :
Computational intelligence; Feedback; Game theory; Information security; Laboratories; Natural languages; Optimization methods; Redundancy; Usability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2007 International Conference on
Conference_Location :
Harbin, China
Print_ISBN :
0-7695-3072-9
Electronic_ISBN :
978-0-7695-3072-7
Type :
conf
DOI :
10.1109/CIS.2007.25
Filename :
4415456
Link To Document :
بازگشت