Abstract
This paper proposes a game theoretic methodology for analysis and design of survivable and secure systems and protocols. Modern game theory provides a natural setup for dealing with adversarial situations, which may involve multiple adversaries with different objectives, resources, access and risk tolerance, e.g., hackers, terrorists, and national intelligence organizations. The solution based on the game theoretic methodology balances ease of access and cost-effectiveness on the one hand, with survivability, fault tolerance, and security on the other hand. The main methodological difficulty in developing game theoretic model of real systems is quantifications of the “rules of the game”, including set of feasible strategies and utility function for each player. Computational challenges result from difficulty of solving games with realistic number of players and feasible strategies.
This work was supported by DARPA Network Modeling and Simulation (NMS) Program
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Neumann, P.G.: Practical Architectures for Survivable Systems and Networks. Technical report, SRI International (2000), http://www.csl.sri.com/neumann/survivability.pdf
Salter, C., Saydjari, O.S., Schneier, B., Walner, J.: Towards a Secure System Engineering Methodology. Technical Report.: http://www.counterpane.com/secure-methodology.pdf
Blackwell, D., Girschick, M.: Theory of Games and Statistical Decisions. Wiley, New York (1954)
Marbukh, V.: Minimum Regret Approach to Network Management under Uncertainty with Applications to Connection Admission Control and Routing. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 309–318. Springer, Heidelberg (2001)
Koutsoupias, E., Papadimitriou, C.H.: Beyond competitive analysis. In: Foundations of Computer Science (1994), (updated version available at http://www.cs.berkeley.edu/christos/
Marbukh, V.: Network Management under Incomplete Information on the Operational Environment. In: International Symposium on Information Theory and Its Applications (ISITA2000), Honolulu, Hawaii, pp. 637–640 (2000)
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (2000)
Marbukh, V.: Optimization of Adaptive Distributed Protocols as a Game. In: ACM SIGMETRICS 2003: First Workshop on Algorithms and Architectures for Self-Managing Systems, San Diego, CA, USA (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kumar, S., Marbukh, V. (2003). A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_41
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive