DocumentCode :
3409935
Title :
DGM approach to network attacker and defender strategies
Author :
Alese, B.K. ; Babatunde, Iwasokun Gabriel ; Israel, Haruna Danjuma
Author_Institution :
Dept. of Comput. Sci., Fed. Univ. of Technol., Akure, Nigeria
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
313
Lastpage :
320
Abstract :
The computer game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions within the network. Like attack-graph-based model checking, the goal of an anticipation game is to prove that a safety property holds. However, using this kind of game is tedious and error prone on large networks because it assumes that the analyst has prior and complete knowledge of critical network services. This work presents a non-zero, Deterministic Game-Theoretic Modeling (DGM) method for analyzing the security of computer networks. The interaction between an attacker and a defender is viewed as two-player non-zero deterministic game whose model is constructed using a saddle point solution (non-linear program) to compute the value of the game. The probability of possible attack on a network given available attacker strategy or best-response strategies for the attacker and the defender was demonstrated. The simulation of the model was achieved using Java, which is a high level language with object oriented programming capabilities and features. The backend is implemented using MySQL, which is a widely used relational database management system (RDBMS). Selected results of the games played were presented with analysis showing some likely attacker activities and the counter measures from the defender.
Keywords :
Java; SQL; computer games; computer network security; deterministic algorithms; game theory; network theory (graphs); nonlinear programming; object-oriented programming; probability; relational databases; DGM approach; Java; MySQL; RDBMS; administrator concurrent interaction; attack graph extension; attacker-defender interaction; computer game; computer network security analysis; counter measures; deterministic game theory modeling; high level language; network attacker strategy; network defender strategy; network intruder interaction; nonlinear program; nonzero deterministic game; object oriented programming; probability; relational database management system; saddle point solution; Computational modeling; Games; defence strategie; game theory; modeling; network attack; saddle point;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2013.6750213
Filename :
6750213
Link To Document :
بازگشت