Game Theory Models for Network Security Carla Di Cairano-Gilfedder, BT 4 th Mathematics of Networks Workshop at QMUL London 22 nd July 2005.

Slides:



Advertisements
Similar presentations
Overview of Quantitative Finance and Risk Management Research By Dr. Cheng-Few Lee Distinguished Professor, Rutgers University, USA Distinguished Professor,
Advertisements

Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
Network Science and Engineering (NetSE) Research Agenda: v1.0 5 th GENI Engineering Conference Seattle, WA 21 July 2009 Ellen Zegura, Georgia Tech.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Time Horizons in Interdependent Security David J. Hardisty, Howard Kunreuther, David H. Krantz, & Poonam Arora Columbia University & University of Pennsylvania.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 A Preamble into Aligning Systems Engineering and Information Security Risk Dr. Craig.
Fuzzy immune PID neural network control method based on boiler steam pressure system Third pacific-asia conference on circuits,communications and system,
Interdependent Security Games and Networks Networked Life CSE 112 Spring 2006 Prof. Michael Kearns.
Network of Excellence in Internet Science 3 rd EINS Summer School Volos, July 2014 Anna Satsiou (CERTH) FP7-ICT EINS Network of Excellence.
Adaptive Infrastructures EPRI/DoD Initiative on Complex Interactive Networks/Systems Joint innovative research ·EPRI and ·Office of the Director of Defense.
MS Computer Science: Dr. William J. Wolfe Professor and Chair Computer Science CSUCI MS Mathematics: Dr. Ivona Grzegorczyk Professor and Chair Mathematics.
Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Information Systems Seidenberg School of Computer Science.
QR 38, 2/6/07 Overview of game theory I. Strategic interaction II. Game theory and international relations III. Deterrence.
Towards the Sustainable use of Europe's forests - the missing elements Keith Rennolls, University of Greenwich, U.K. This workshop,
Von Neumann & the Bomb Strategy is not concerned with the efficient application of force but with the exploitation of potential force (T. Schelling, 1960,
Course Overview: Part 1. Course Overview: Part 2.
B.B.A. Finance. Finance: Aim F prepare graduates for responsible management positions in the area of finance in the industrial, commercial, financial.
Game Strategies in Network Security Kong-wei Lye and Jeannette M. Wing Carnegie Mellon University Pittsburgh, Pennsylvania, U.S.A.
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Department of Economics and Finance Department of Economics and Finance, City University of Hong Kong Page 1.
Background Required. Mathematical Courses Calculus I and II Multivariable Courses Linear Algebra Differential Equations (ODE and PDE’s) Probability Statistics.
Do we need theoretical computer science in software engineering curriculum: an experience from Uni Novi Sad Bansko, August 28, 2013.
Performance Evaluation of Networks, part II Giovanni Neglia G. Neglia10 December 2012.
MTH374: Optimization For Master of Mathematics By Dr. M. Fazeel Anwar Assistant Professor Department of Mathematics, CIIT Islamabad 1.
Tutor: Prof. A. Taleb-Bendiab Contact: Telephone: +44 (0) CMPDLLM002 Research Methods Lecture 8: Quantitative.
Defensive Terrain in Cyberspace Thomas Pingel January 31, 2002 Advisor: Sara Fabrikant Committee?
Theme 1: Introduction. Politology. The principal notions of science.
Web Science Subject Categorization: a proposal for discussion version 0.2 Michalis Vafopoulos 23/9/2010 Curriculum Workshop, University of Southampton.
Page 1 Ming Ji Department of Computer Science University of Illinois at Urbana-Champaign.
Overview BT’s contribution to WISDOM in 2 nd semester Dr Carla Di Cairano-Gilfedder BT GCTO Office, Research Department 4 th June 2006, Crete.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Price Differentiation in the Kelly Mechanism Richard Ma School of Computing, National University of Singapore Advanced Digital Sciences Center, Illinois.
Management 337 / Summer 2005 / Organization Theories / Slide # 1 Organization Theories.
Algorithms and Visualization. Strategy ALG: algorithms and data structures for spatial data fundamental, curiosity-driven research applications in other.
Spring ÇGIE lecture 11 lecture 1 : introduction This lecture tries to answer the following questions: how different is IE from other engineering.
Center for Reliable Engineering Computing (REC) We handle computations with care Founded 2000.
IB TES Information Technology in a Global Society.
International Workshop on Resonance Oscillations and Stability of Nonsmooth Systems Imperial College London London, United Kingdom June 16–25, 2009 A joint.
Management Science Helps analyze and solve organizational problems. It uses scientific and quantitative methods to set up models that are based on controllable.
Doing Masters Degree in Oxford Svetlana Andrianova And Olga Voronina 19 th October 2006.
INNOVATION AND INTERNATIONALIZATION OF HIGHER EDUCATION AS MEANS OF QUALITY IMPROVEMENT AT THE UNIVERSITY OF ZILINA Mária Lusková, Branislav Dobrucký University.
Operations Research The OR Process. What is OR? It is a Process It assists Decision Makers It has a set of Tools It is applicable in many Situations.
Introduction to Operations Research. MATH Mathematical Modeling 2 Introduction to Operations Research Operations research/management science –Winston:
Rationality and Irrationality of Auction Bidders Interdisciplinary Perspective Joanna Białynicka-Birula Cracow University of Economics POLAND.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Overview of the Training Program Leaning Program on Regional Research Development and Methodology 3 – 21 May 2010.
COIT23003 Games Development Research Directions. References C. Fairclough, M. Fagan, B. Mac Namee and P. Cunningham, "Research Directions for AI in Computer.
Operations Research Models and Methods Advanced Operations Research Reference: Operations Research Models and Methods, Operations Research Models and Methods,
Game Theoretic Model of Censorship Resistance Andrei Serjantov University of Cambridge Computer Laboratory.
Software Architecture Exercise 3 System Architecture © Ingo Arnold Department Computer Science University of Basel Introduction.
Venu Veeravalli ECE Dept and Coordinated Science Lab University of Illinois at Urbana-Champaign
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
CS 1010– Introduction to Computer Science Daniel Tauritz, Ph.D. Associate Professor of Computer Science Director, Natural Computation Laboratory Academic.
COmbining Probable TRAjectories — COPTRA
Artificial Intelligence
Analysis of Computing Options at ISU
A framework for Web science didactics michalis vafopoulos
CS 1010– Introduction to Computer Science
BSC ECONOMICS BSc Honours : BSc Honours B.Sc. (Economics) Honours is a full-time, three-year graduation programme. It aims at imparting a programme structure.
Curriculum in Statistics at the University of Oviedo
מטח, המרכז לטכנולוגיה חינוכית
Networks of Unmanned Underwater Vehicles
Stochastic Game Models in Cyber Security
Yves Morier European Aviation Safety Agency
Distributed Sensing, Control, and Uncertainty
VEHICLE TECHNOLOGY AIR CONDITIONING SYSTEMS.
Department of Mathematics
CV: Dr. Hans Georg Zimmermann, Chief Scientist at Fraunhofer IIS
Systems, Cybernetics and Complexity: Advancing the Systems Movement
Presentation transcript:

Game Theory Models for Network Security Carla Di Cairano-Gilfedder, BT 4 th Mathematics of Networks Workshop at QMUL London 22 nd July 2005

Overview Intrusion Detection in Access Control Interdependent security Information Warfare ______________________________ Abstract Game Theory is a discipline concerned with the study of interactions between two or more entities with conflicting or mixed interests. It has successfully and extensively been applied in several fields including mathematics, economics, social sciences, decision theory, and behavioural sciences. In the last few years, Game Theory has also attracted the attention of Security researchers aiming to develop quantitative analysis techniques for Network and Information Security. For them it provides a natural vehicle for a rigorous formulation of attacks, threat analysis, and reactive decision making. This presentation provides an overview of some of the proposed models in the sub-fields of Intrusion Detection, Interdependent Security, and Information Warfare.

Intrusion Detection as a zero-sum game A Game Theoretic Analysis of Intrusion Detection In Access Control Systems, T. Alpcan and T. Basar, University Illinois at Urbana-Champaign in Proc. of 43rd IEEE CDC, Dec _______________________________ Interdependent security H. Kunreuther, Univ. Pennsylvania G. Heal, Columbia University Journal of Risk and Uncertainty, 2002 _______________________________ A game theory model of Information Warfare D. Burke, USAF Air Force Institute of Technology, Air University, Master of Science, 1999 _______________________________ Computer network security as a stochastic non-zero-sum game Game strategies in network security, by K. Lye and J. Wing, Carnagie Mellon University, Int. Journal Inf. Security 2005 The presentation provided an overview of following models