8,988 research outputs found

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense

    Full text link
    Moving Target Defense (MTD) has emerged as a newcomer into the asymmetric field of attack and defense, and shuffling-based MTD has been regarded as one of the most effective ways to mitigate DDoS attacks. However, previous work does not acknowledge that frequent shuffles would significantly intensify the overhead. MTD requires a quantitative measure to compare the cost and effectiveness of available adaptations and explore the best trade-off between them. In this paper, therefore, we propose a new cost-effective shuffling method against DDoS attacks using MTD. By exploiting Multi-Objective Markov Decision Processes to model the interaction between the attacker and the defender, and designing a cost-effective shuffling algorithm, we study the best trade-off between the effectiveness and cost of shuffling in a given shuffling scenario. Finally, simulation and experimentation on an experimental software defined network (SDN) indicate that our approach imposes an acceptable shuffling overload and is effective in mitigating DDoS attacks

    The past and future of terrorism research

    Get PDF
    Este artĂ­culo destaca cinco ĂĄreas donde el anĂĄlisis econĂłmico del terrorismo ha tenido mayor relevancia en las polĂ­ticas de los Ășltimos 30 años. Estas ĂĄreas son la evaluaciĂłn de la efectividad de las acciones contra el terrorismo, la identificaciĂłn de las causas del terrorismo, la mediciĂłn de las consecuencias econĂłmicas del terrorismo, el anĂĄlisis de la dinĂĄmica de las series temporales de actos terroristas y la formulaciĂłn de representaciones del terrorismo basadas en la teorĂ­a de juegos. La principal novedad del artĂ­culo es que sintetiza investigaciones anteriores e identifica las cuestiones mĂĄs importantes en las polĂ­ticas que requieren un anĂĄlisis adicional. Estas cuestiones permiten entender cĂłmo operan las redes globales de terrorismo, evaluar los resultados de las estrategias antiterroristas y de formas alternativas de cooperaciĂłn internacional e investigar los aspectos estratĂ©gicos del terrorismo de suicidas. Se ofrece un procedimiento para tratar cada una de estas polĂ­ticas.terrorismo, contraterrorismo, anĂĄlisis coste beneficio, teorĂ­a de juegos, efectividad de las polĂ­ticas, consecuencias econĂłmicas.
    • 

    corecore