Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.1.135

An Anti-Virus Vaccine Selection Model Based on Stackelberg Game  

Sung, Si-Il (Division of Information Management Engineering, Korea University)
Choi, In-Chan (Division of Information Management Engineering, Korea University)
Abstract
This paper deals with an information security problem that involves the strategies of both an attacker and an administrator of a web-based system. A game-theoretic model for the problem, based on an Stackelberg game environment, is presented. In the model, the administrator selects a set of anti-virus vaccines to cope with potential system attackers and the intruder chooses attacking modes that are most effective against the administrator's chosen set of vaccines. Moreover, the model considers a number of practical constraints, such as a budget limit on the vaccine purchase and a limit on the system performance. In addition, two different scenario analyses are provided, based on the results of the proposed model applied to a simulated pseudo-real-world data.
Keywords
Network Security; Stackelberg Game; Game Theory;
Citations & Related Records
연도 인용수 순위
  • Reference
1 김우한, 심원태, 노명선, 최중섭, 허창열, "정보시스템 해킹, 바이러스 현황 및 대응," 한국정보보호진흥원, 2006년 12월
2 A. Clementi, "Anti-Virus comparative, No.11," AV comparatives, Aug. 2006
3 T. Alpcan and T. Basar, "A game theoretic approach to decision and analysis in network intrusion detection," Decision and Control, vol. 42, no. 3, pp. 2595-2600, Dec. 2003
4 K. Lye and J. Wing, "Game strategies in network security," International Journal of Information Security, vol. 4, no. 1-2, pp. 71-86. Feb. 2005   DOI   ScienceOn
5 D. Fudenberg and J. Tirole, Game Theory, MIT Press, pp. 1-63, Feb. 1991
6 X. You and Z. Shiyong, "A Kind of network security behavior model Based on game theory," Parallel and Distributed Computing, Applications and Technologies, pp. 950-954, Aug. 2003
7 M. Kodialam and V. Lakshman, "Detecting Network Intrusions via Sampling: A Game Theoretic Approach," IEEE INFOCOM 2003, vol. 3, pp. 1880-1889, Mar. 2003
8 R. Myerson, Game Theory: Analysis of Conflict, Harvard Press, Nov. 1991
9 J. Oberheide, E. Cooke and F. Jahanian, "Rethinking Antivirus: Executable Analysis in the Network Cloud," Proceedings of the 2nd USENIX Work shop on Hot Topics in Security, pp. 1-11, Aug. 2007
10 R. Aumann and S. Hart, Handbook of Game Theory with Economic Application, ELSEVIER, vol. 3, pp. 1723-1797, Jan. 2002
11 M. Mavronicolas, V. Papadopoulou, A. Philippou and P. Spirakis, "A Graph -Theoretic Network Security Game," International Journal of Autonomous and Adaptive Communications Systems, vol. 1, no. 4, pp. 390-410, May 2008   DOI   ScienceOn