DocumentCode :
2742260
Title :
Defensive configuration with game theory
Author :
Becker, Sheila ; State, Radu ; Engel, Thomas
Author_Institution :
LORIA - INRIA Lorraine, Villers-les-Nancy, France
fYear :
2009
fDate :
1-5 June 2009
Firstpage :
453
Lastpage :
459
Abstract :
This paper proposes a new model, based on mainstream game theory for the optimal configuration of services. We consider the case of reliable realtime P2P communications and show how the configuration of security mechanisms can be configured using game theoretical concepts, in which the defendant is played by the management plane having to face adversaries which play the attacker role. Our main contribution lies in proposing a risk assessment framework and deriving optimal strategies - in terms of Nash equilibrium - for both the attacker and the defendant. We consider the specific service of communications in autonomic networks and we show how the optimal configuration can be determined within the proposed framework.
Keywords :
game theory; peer-to-peer computing; real-time systems; risk management; security of data; Nash equilibrium; autonomic networks; defensive configuration; game theoretical concepts; game theory; optimal configuration; optimal strategy; reliable realtime P2P communications; risk assessment framework; security mechanisms; Computer architecture; Game theory; Nash equilibrium; Protocols; Real time systems; Reliability theory; Resilience; Risk management; Security; Telecommunication network reliability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Integrated Network Management, 2009. IM '09. IFIP/IEEE International Symposium on
Conference_Location :
Long Island, NY
Print_ISBN :
978-1-4244-3486-2
Electronic_ISBN :
978-1-4244-3487-9
Type :
conf
DOI :
10.1109/INM.2009.5188848
Filename :
5188848
Link To Document :
بازگشت