• DocumentCode
    2565684
  • Title

    Game Theory Based Optimization of Security Configuration

  • Author

    Shi, Jin ; Lu, Yin ; Xie, Li

  • fYear
    2007
  • fDate
    15-19 Dec. 2007
  • Firstpage
    799
  • Lastpage
    803
  • Abstract
    How to make a trade off between the security of sys- tems and the usability of users is an important issue in network security configuration. To resolve this problem, an optimization method of security configuration based on game theory is proposed. Firstly, a security configuration model based on non-cooperative game is built which in- fers the optimal strategy of systems and users respectively by calculating their strategies and incentives. Secondly, to optimize security configuration further, it cooperatively optimizes the individual optimal strategy by cooperative game, thus eliminating the cases that individual optimal is not the overall optimal. An illustrated experiment shows that this method can coordinate the security of network systems and usability of users so that the security configu- ration of system is optimized magnificently.
  • Keywords
    Computational intelligence; Feedback; Game theory; Information security; Laboratories; Natural languages; Optimization methods; Redundancy; Usability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security, 2007 International Conference on
  • Conference_Location
    Harbin, China
  • Print_ISBN
    0-7695-3072-9
  • Electronic_ISBN
    978-0-7695-3072-7
  • Type

    conf

  • DOI
    10.1109/CIS.2007.25
  • Filename
    4415456