Skip to main content

A Holistic Game Inspired Defense Architecture

  • Conference paper
Recent Progress in Data Engineering and Internet Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 157))

Abstract

Ad-hoc security mechanisms are effective in solving the particular problems they are designed for, however, they generally fail to respond appropriately under dynamically changing real world scenarios. We discuss a novel holistic security approach which aims at providing security using a quantitative decision making framework inspired by game theory. We consider the interaction between the attacks and the defense mechanisms as a game played between the attacker and the defender. We discuss one implementation of our holistic approach, namely, game inspired defense architecture in which a game decision model decides the best defense strategies for the other components in the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Delgado, N., Gates, Q., Roach, S.: A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools. IEEE Transactions on Software Engineering 30(12) (December 2004)

    Google Scholar 

  2. Kranitis, N., Paschalis, A., Gizopoulos, D., Xenoulis, G.: Software Based Self-Testing of Embedded Processors. IEEE Transactions on Computers 54(4) (April 2005)

    Google Scholar 

  3. Shiva, S., Roy, S., Bedi, H., Dasgupta, D., Wu, Q.: An Imperfect Information Stochastic Game Model for Cyber Security. In: The 5th International Conference on i-Warfare and Security (2010)

    Google Scholar 

  4. Shiva, S., Roy, S., Dasgupta, D.: Game theory for cyber security. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (2010)

    Google Scholar 

  5. Simmons, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT: A cyber attack taxonomy. Technical Report: CS-09-003. University of Memphis (August 2009)

    Google Scholar 

  6. Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks. In: Part of the 2010 Spring Simulation Multi Conference on 43rd Annual Simulation Symposium (ANSS 2010), April 11-15 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajjan Shiva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shiva, S., Bedi, H.S., Simmons, C.B., Fisher, M., Dharam, R. (2012). A Holistic Game Inspired Defense Architecture. In: Gaol, F. (eds) Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28798-5_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28798-5_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28797-8

  • Online ISBN: 978-3-642-28798-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics