A Holistic Game Inspired Defense Architecture

  • Sajjan Shiva
  • Harkeerat Singh Bedi
  • Chris B. Simmons
  • Marc FisherII
  • Ramya Dharam
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 157)

Abstract

Ad-hoc security mechanisms are effective in solving the particular problems they are designed for, however, they generally fail to respond appropriately under dynamically changing real world scenarios. We discuss a novel holistic security approach which aims at providing security using a quantitative decision making framework inspired by game theory. We consider the interaction between the attacks and the defense mechanisms as a game played between the attacker and the defender. We discuss one implementation of our holistic approach, namely, game inspired defense architecture in which a game decision model decides the best defense strategies for the other components in the system.

Keywords

Intrusion Detection System Knowledge Management System Transport Layer Security Security Infrastructure Game Agent 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Delgado, N., Gates, Q., Roach, S.: A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools. IEEE Transactions on Software Engineering 30(12) (December 2004)Google Scholar
  2. 2.
    Kranitis, N., Paschalis, A., Gizopoulos, D., Xenoulis, G.: Software Based Self-Testing of Embedded Processors. IEEE Transactions on Computers 54(4) (April 2005)Google Scholar
  3. 3.
    Shiva, S., Roy, S., Bedi, H., Dasgupta, D., Wu, Q.: An Imperfect Information Stochastic Game Model for Cyber Security. In: The 5th International Conference on i-Warfare and Security (2010)Google Scholar
  4. 4.
    Shiva, S., Roy, S., Dasgupta, D.: Game theory for cyber security. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (2010)Google Scholar
  5. 5.
    Simmons, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT: A cyber attack taxonomy. Technical Report: CS-09-003. University of Memphis (August 2009)Google Scholar
  6. 6.
    Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks. In: Part of the 2010 Spring Simulation Multi Conference on 43rd Annual Simulation Symposium (ANSS 2010), April 11-15 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sajjan Shiva
    • 1
  • Harkeerat Singh Bedi
    • 1
  • Chris B. Simmons
    • 1
  • Marc FisherII
    • 1
  • Ramya Dharam
    • 1
  1. 1.University of MemphisMemphisUSA

Personalised recommendations