Stochastic Game Models Within Cyber Security- A Survey

1651 WordsSep 25, 20157 Pages
Stochastic game models in cyber security- a survey Kandethody Ramachandran and Zheni Stefanova University of South Florida Department of Mathematics and Statistics Tampa, FL 33620-5700 Abstract The internet is an integral way of conducting daily business from government agencies to entertainers. Protection of attack, damage, or unauthorized access is necessary with the increase of mobile users, digital applications and data networks. A cyber-security problem can be viewed as a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that can each have competing objectives. For instance, the defender may be interested in ensuring that the system performs at or above a certain acceptable level. The attacker’s objective may be to disrupt the system and degrade it. Game theory is a well-established tool that can be used to analyze such problems. In this work, we present a brief survey of how game theory can be used to find appropriate strategies for both the attacker and the administrator (defender). We model the interactions between them as a stochastic game. Various formulations of game theory will be presented to deal with different cyber security situations. We will present mathematical models of security systems to analyze the system’s performance and to predict the likely behavior of key decision makers that influence/control the system. Introduction The purpose of this paper will be to

More about Stochastic Game Models Within Cyber Security- A Survey

Open Document