Font Size: a A A

Using noncooperative potential games to improve network security

Posted on:2011-06-13Degree:Ph.DType:Dissertation
University:Oklahoma State UniversityCandidate:Harrington, Patrick DFull Text:PDF
GTID:1448390002451517Subject:Computer Science
Abstract/Summary:
Scope and Method of Study. Our work puts forth a game theoretic global security mechanism to optimize security in a large heterogeneous network consisting of autonomous devices. Our work is applicable to a network that includes various computing devices such as PCs, cell phones, sensors, and control systems. Constraint satisfaction is used to fulfill the requirements of the differing computers in the network. Security metrics are used to quantify network security in a meaningful way. Attack tree analysis of the quantified security measurements is performed for decision-making to maximize security by altering links that form the network. Coalitions of the computers forming the network are used to improve efficiency, as well as give a broader and greater overall security than would be possible in their absence. Side payments are used to induce a computer to move beyond its selfish motivations to benefit another computer. In keeping with noncooperative game rules, costs to form links are imposed only on the initiator of the link.;Findings and Conclusions. Our solution is presented as a noncooperative weighted potential game using pure or mixed strategies. Findings showed that our game theory model of optimization improved overall security for heterogeneous networks, and demonstrated the viability of quantitative security analysis using metrics. Our game theory model of side payments and coalitions increased security by 10% in our experiments. Side payments more than doubled convergence time to optimal network security; however, side payments that were twice as effective in terms of security improvement reduced convergence time by 50%. Our game theory model of mixed strategies showed longer convergence time but overall improved security versus our pure strategy model. Findings also demonstrated that our game theory model of optimization improved security for networks of varying size. Through these solutions, our work presents a novel optimization technique that improves overall security for a heterogeneous network.
Keywords/Search Tags:Security, Network, Game theory model, Side payments, Noncooperative, Computer
Related items