DocumentCode
2565684
Title
Game Theory Based Optimization of Security Configuration
Author
Shi, Jin ; Lu, Yin ; Xie, Li
fYear
2007
fDate
15-19 Dec. 2007
Firstpage
799
Lastpage
803
Abstract
How to make a trade off between the security of sys- tems and the usability of users is an important issue in network security configuration. To resolve this problem, an optimization method of security configuration based on game theory is proposed. Firstly, a security configuration model based on non-cooperative game is built which in- fers the optimal strategy of systems and users respectively by calculating their strategies and incentives. Secondly, to optimize security configuration further, it cooperatively optimizes the individual optimal strategy by cooperative game, thus eliminating the cases that individual optimal is not the overall optimal. An illustrated experiment shows that this method can coordinate the security of network systems and usability of users so that the security configu- ration of system is optimized magnificently.
Keywords
Computational intelligence; Feedback; Game theory; Information security; Laboratories; Natural languages; Optimization methods; Redundancy; Usability;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Security, 2007 International Conference on
Conference_Location
Harbin, China
Print_ISBN
0-7695-3072-9
Electronic_ISBN
978-0-7695-3072-7
Type
conf
DOI
10.1109/CIS.2007.25
Filename
4415456
Link To Document