Skip to main content

A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols

  • Conference paper
Computer Network Security (MMM-ACNS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2776))

Abstract

This paper proposes a game theoretic methodology for analysis and design of survivable and secure systems and protocols. Modern game theory provides a natural setup for dealing with adversarial situations, which may involve multiple adversaries with different objectives, resources, access and risk tolerance, e.g., hackers, terrorists, and national intelligence organizations. The solution based on the game theoretic methodology balances ease of access and cost-effectiveness on the one hand, with survivability, fault tolerance, and security on the other hand. The main methodological difficulty in developing game theoretic model of real systems is quantifications of the “rules of the game”, including set of feasible strategies and utility function for each player. Computational challenges result from difficulty of solving games with realistic number of players and feasible strategies.

This work was supported by DARPA Network Modeling and Simulation (NMS) Program

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Neumann, P.G.: Practical Architectures for Survivable Systems and Networks. Technical report, SRI International (2000), http://www.csl.sri.com/neumann/survivability.pdf

  2. Salter, C., Saydjari, O.S., Schneier, B., Walner, J.: Towards a Secure System Engineering Methodology. Technical Report.: http://www.counterpane.com/secure-methodology.pdf

  3. Blackwell, D., Girschick, M.: Theory of Games and Statistical Decisions. Wiley, New York (1954)

    MATH  Google Scholar 

  4. Marbukh, V.: Minimum Regret Approach to Network Management under Uncertainty with Applications to Connection Admission Control and Routing. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 309–318. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Koutsoupias, E., Papadimitriou, C.H.: Beyond competitive analysis. In: Foundations of Computer Science (1994), (updated version available at http://www.cs.berkeley.edu/christos/

  6. Marbukh, V.: Network Management under Incomplete Information on the Operational Environment. In: International Symposium on Information Theory and Its Applications (ISITA2000), Honolulu, Hawaii, pp. 637–640 (2000)

    Google Scholar 

  7. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (2000)

    Google Scholar 

  8. Marbukh, V.: Optimization of Adaptive Distributed Protocols as a Game. In: ACM SIGMETRICS 2003: First Workshop on Algorithms and Architectures for Self-Managing Systems, San Diego, CA, USA (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, S., Marbukh, V. (2003). A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45215-7_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40797-3

  • Online ISBN: 978-3-540-45215-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics