메뉴 건너뛰기




Volumn 3, Issue , 2008, Pages 498-504

A game theoretical attack-defense model oriented to network security risk assessment

Author keywords

Framework; Game theory; GTADM; Risk assessment

Indexed keywords

BENEFIT ANALYSIS; EXISTING METHOD; FRAMEWORK; GTADM; ITS EFFICIENCIES; PAYOFF MATRIX; RISK ASSESSMENT FRAMEWORK; SECURITY RISK ASSESSMENTS; SECURITY STRATEGIES; STRATEGIC INTERACTIONS; FRAME-WORK;

EID: 79951501558     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSSE.2008.1651     Document Type: Conference Paper
Times cited : (44)

References (19)
  • 1
    • 38949132578 scopus 로고    scopus 로고
    • K. Haslum, A. Arnes, "Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models", Proceedings of International Conference on Computational Intelligence and Security, vol.2, Guangzhou, Guangdong, China, 3-6 Nov. 2006, pp. 1536-1540.
  • 2
    • 51049108373 scopus 로고    scopus 로고
    • Huisheng Gao, Jing Zhu, and Congcong Li, "The analysis of uncertainty of network security risk assessment using Dempster-Shafer theory", Proceedings of 12th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Xian, Shanxi, China, 16-18 Apr. 2008, pp. 754-759.
  • 3
    • 79951500936 scopus 로고    scopus 로고
    • Hua Liu, "The Research and Application of the Risk Assessment Technology" [Master], National University of Defense Technology, Changsha, Hunan, China, Nov. 2005.
  • 4
    • 79951494832 scopus 로고    scopus 로고
    • Yingmei Wang, Shengkai Wang, Guoshun Chen, and Xiangyun Cheng, Information Security Risk Assessment, Publish House of Electronics Industry, Beijing, China, 2007.
  • 5
    • 79951470807 scopus 로고    scopus 로고
    • Karin Sallhammar, "Stochastic Models for Combined Security and Dependability Evaluation" [Ph.d], Norwegian University of Science and Technology, Trondheim, June 2007.
  • 6
    • 51849096703 scopus 로고    scopus 로고
    • P.F. Syverson, "A different look at secure distributed computation", Proceedings of the 10th Computer Security Foundations Workshop, The Institute of Electrical and Electronics Engineers, Inc., Rockport, Maui, Hawaii, USA, 10-12 June 1997, pp. 109-115.
  • 7
    • 79951470178 scopus 로고    scopus 로고
    • Samuel N. Hamilton, Wendy L. Miller, and Allen Ott, "The Role of Game Theory in Information Warfare", 4th Information survivability workshop (ISW-2001/2002), www.cyberdefenseagency.com
  • 8
    • 14344258545 scopus 로고    scopus 로고
    • Peng Liu, Wanyu Zang, "Incentive-Based Modeling and Inference of Attacker Intent, Objectives, and Strategies", Proceedings of the 10th ACM conference on Computer and Communications Security, ACM Press, Washington D.C., USA. 27-30 Oct. 2003, pp. 179-189.
  • 9
    • 14844293542 scopus 로고    scopus 로고
    • Kong-wei Lye, Jeannette M. Wing, "Game strategies in network security", International Journal of Information Security, Preface to the special issue of selected papers from FCS/VERIFY 2002, Vol. 4, Numbers 1-2, Springer Berlin / Heidelberg, Feb. 2005, pp. 71-86
  • 10
    • 85128535352 scopus 로고    scopus 로고
    • Tansu Alpcan, Tamer Basar, "A Game Theoretic Analysis of Intrusion Detection in Access Control Systems", 43rd IEEE Conference on Decision and Control(CDC), vol.2, Atlantis, Paradise Island, Bahamas, 14-17 Dec. 2004, pp. 1568-1573
  • 11
    • 85128573835 scopus 로고    scopus 로고
    • Tansu Alpcan, Tamer Basar, "A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection," Proceedings of the 42nd IEEE Conference on Decision and Control, vol.3, Maui, Hawaii, USA, 9-12 Dec. 2003, pp. 2595-2600.
  • 12
    • 15944395410 scopus 로고    scopus 로고
    • A. Patcha and J.-M. Park, "A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks," Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC , 10-11 June 2004, pp. 280-284.
  • 13
    • 18844454790 scopus 로고    scopus 로고
    • A. Agah, S.K. Das, K. Basu and M. Asadi, "Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach", Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA'04), August- September 2004, pp. 343-346.
  • 14
    • 79951481989 scopus 로고    scopus 로고
    • Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", National Institute of Standards and Technology, Special Publication 800-30, July 2002.
  • 15
    • 84948965481 scopus 로고    scopus 로고
    • R. Ritchey, B. O'Berry, and S. Noel, "Representing TCP/IP Connectivity for Topological Analysis of Network Security", Proceedings of 18th Annual Computer Security Applications Conference, Las Vegas, Nevada , USA, 9-13 December 2002, pp. 25-31
  • 16
    • 79951494636 scopus 로고    scopus 로고
    • Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, and Erez Zadok, "Toward Cost-Sensitive Modeling for Intrusion Detection and Response", North Carolina State University, 2000.
  • 17
    • 48349108542 scopus 로고    scopus 로고
    • Wei Jiang, Hongli Zhang, Zhihong Tian, and Xinfang Song, "A game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy", Proceedings of 2007 International Conference on Computational Intelligence and Security(CIS), Harbin, Heilongjiang, China, 15-19 Dec. 2007, pp. 819-823
  • 18
    • 44449136625 scopus 로고    scopus 로고
    • Jin Shi, Yin Lu, and Li Xie, "Dynamic Intrusion Response Based on Game Theory", Journal of Computer Research and Development, The Institute of Computing Technology of the Chinese Academy of Sciences, Beijing, China, vol. 45, no. 5, May 2008, pp. 747-757.
  • 19
    • 79951503179 scopus 로고    scopus 로고
    • M J Osborne, A Rubinstein, R Aumann, et al, A Course in Game Theory, 2nd ed [M], The MIT Press, Cambridge, 1994


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.