Skip to main content
SHARE
Publication

Information Security Analysis Using Game Theory and Simulation...

by Bob G Schlicher, Robert K Abercrombie
Publication Type
Conference Paper
Book Title
Proceedings of the 2012 International Conference on Security and Management (SAM 2012)
Publication Date
Page Numbers
540 to 546
Volume
1
Publisher Location
San Deigo, California, United States of America
Conference Name
WORLDCOMP'12 - The 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing; SAM'12 - 2012 International Conference on Security and Management
Conference Location
Las Vegas, Nevada, United States of America
Conference Sponsor
World Academy of Science (www.world-academy-of-science.org)
Conference Date
-

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players’ actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.