About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Game Theory for Networks. 2nd International ICST Conference, GAMENETS 2011, Shanghai, China, April 16-18, 2011, Revised Selected Papers

Research Article

A Network Security Classification Game

Download(Requires a free EAI acccount)
507 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-30373-9_19,
        author={Ning Bao and O. Kreidl and John Musacchio},
        title={A Network Security Classification Game},
        proceedings={Game Theory for Networks. 2nd International ICST Conference, GAMENETS 2011, Shanghai, China, April 16-18, 2011, Revised Selected Papers},
        proceedings_a={GAMENETS},
        year={2012},
        month={10},
        keywords={network security classification game sequential detection},
        doi={10.1007/978-3-642-30373-9_19}
    }
    
  • Ning Bao
    O. Kreidl
    John Musacchio
    Year: 2012
    A Network Security Classification Game
    GAMENETS
    Springer
    DOI: 10.1007/978-3-642-30373-9_19
Ning Bao1,*, O. Kreidl2,*, John Musacchio1,*
  • 1: University of California Santa Cruz
  • 2: BAE Systems–Technology Solutions
*Contact email: nbao@soe.ucsc.edu, pat.kreidl@baesystems.com, johnm@soe.ucsc.edu

Abstract

We consider a network security classification game in which a strategic defender decides whether an attacker is a strategic spy or a naive spammer based on an observed sequence of attacks on file- or mail-servers. The spammer’s goal is attacking the mail-server, while the spy’s goal is attacking the file-server as much as possible before detection. The defender observes for a length of time that trades-off the potential damage inflicted during the observation period with the ability to reliably classify the attacker. Through empirical analyses, we find that when the defender commits to a fixed observation window, often the spy’s best response is either full-exploitation mode or full-confusion mode. This discontinuity prevents the existence of a pure Nash equilibrium in many cases. However, when the defender can condition the observation time based on the observed sequence, a Nash equilibrium often exists.

Keywords
network security classification game sequential detection
Published
2012-10-08
http://dx.doi.org/10.1007/978-3-642-30373-9_19
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL