• DocumentCode
    2887187
  • Title

    Playing Games with Internal Attackers Repeatedly

  • Author

    Kantzavelou, Ioanna ; Katsikas, Sokratis

  • Author_Institution
    Dept. of Inf. & Commun. Syst. Eng., Univ. of the Aegean, Greece
  • fYear
    2009
  • fDate
    18-20 June 2009
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Insiders might threaten organizations´ systems any time. By interacting with a system, an insider plays games with the security mechanisms employed to protect it. We apply game theory to model these interactions in an extensive form game, that is being played repeatedly with an Intrusion Detection System (IDS). The outcomes of the game are quantified by specifying players´ preferences and by assigning numbers to reflect these preferences. Examining players´ best responses, the solution of the game follows by locating all the Nash Equilibria (NE). We extend the NE notion to the logit Quantal Response Equilibrium (QRE), to capture players´ bounded rationality. The QRE results are more realistic and show that the solution of the game might be significantly different than the corresponding NE solution. Thus, we determine how an insider will interact in the future, and how an IDS will react to protect the system.
  • Keywords
    game theory; security of data; Nash equilibrium; extensive form game; game theory; intrusion detection system; logit quantal response equilibrium; Communication systems; Digital systems; Educational technology; Game theory; Informatics; Intrusion detection; Protection; Security; Systems engineering and theory; Systems engineering education;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Systems, Signals and Image Processing, 2009. IWSSIP 2009. 16th International Conference on
  • Conference_Location
    Chalkida
  • Print_ISBN
    978-1-4244-4530-1
  • Electronic_ISBN
    978-1-4244-4530-1
  • Type

    conf

  • DOI
    10.1109/IWSSIP.2009.5367708
  • Filename
    5367708