Skip to main content
Erschienen in: Journal of Network and Systems Management 1/2013

01.03.2013

On Game-Theoretic Network Security Provisioning

Erschienen in: Journal of Network and Systems Management | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Service level agreements occasionally come as qualitative claims rather than quantitative statements. Motivated by the well-known fact that different (security) service goals can be conflicting, we present an axiomatic approach to finding an optimal balance between interdependent service quality criteria with distinct performance indicators. As a by-product, we obtain network provisioning strategies that ensure the promised service level at optimized performance. Our results generally apply to any security infrastructure for which attack and provisioning strategy identification is feasible. Standard security audits can thus be exploited twice, because, apart from forming a convincing sales argument, they directly support security service level agreements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alpcan, T., Başar, T.: Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, Cambridge (2010)CrossRef Alpcan, T., Başar, T.: Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, Cambridge (2010)CrossRef
2.
Zurück zum Zitat Stinson, D.R.: Cryptography: Theory and Practice. Chapman & Hall/CRC, London (2006)MATH Stinson, D.R.: Cryptography: Theory and Practice. Chapman & Hall/CRC, London (2006)MATH
3.
Zurück zum Zitat Elliott, C.: The DARPA quantum network (2007). arXiv:quant-ph/0412029v1 Elliott, C.: The DARPA quantum network (2007). arXiv:quant-ph/0412029v1
4.
Zurück zum Zitat Poppe, A., Peev, M., Maurhart, O.: Outline of the SECOQC quantum-key-distribution network in Vienna. Int. J. Quantum Inf. 6(2), 209–218 (2008)CrossRef Poppe, A., Peev, M., Maurhart, O.: Outline of the SECOQC quantum-key-distribution network in Vienna. Int. J. Quantum Inf. 6(2), 209–218 (2008)CrossRef
5.
Zurück zum Zitat Wang, Y., Desmedt, Y.: Perfectly secure message transmission revisited. IEEE Trans. Inf. Theory 54(6), 2582–2595 (2008)MathSciNetCrossRef Wang, Y., Desmedt, Y.: Perfectly secure message transmission revisited. IEEE Trans. Inf. Theory 54(6), 2582–2595 (2008)MathSciNetCrossRef
6.
Zurück zum Zitat Fitzi, M., Franklin, M.K., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: 4th Theory of Cryptography Conference, pp. 311–322. Springer, Berlin/Heidelberg, Germany (2007) Fitzi, M., Franklin, M.K., Garay, J., Vardhan, S.H.: Towards optimal and efficient perfectly secure message transmission. In: 4th Theory of Cryptography Conference, pp. 311–322. Springer, Berlin/Heidelberg, Germany (2007)
7.
Zurück zum Zitat Fudenberg, D., Tirole, J.: Game Theory. MIT Press, London (1991) Fudenberg, D., Tirole, J.: Game Theory. MIT Press, London (1991)
8.
Zurück zum Zitat Grunske, L., Joyce, D.: Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles. J. Syst. Softw. 81(8), 1327–1345 (2008)CrossRef Grunske, L., Joyce, D.: Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles. J. Syst. Softw. 81(8), 1327–1345 (2008)CrossRef
9.
Zurück zum Zitat Clark, K., Lee, C., Tyree, S., Hale, J.: Guiding threat analysis with threat source models. In: Information Assurance and Security Workshop IAW ’07 IEEE SMC, pp. 262–269 (2007) Clark, K., Lee, C., Tyree, S., Hale, J.: Guiding threat analysis with threat source models. In: Information Assurance and Security Workshop IAW ’07 IEEE SMC, pp. 262–269 (2007)
10.
Zurück zum Zitat Ghose, D.: A necessary and sufficient condition for pareto-optimal security strategies in multicriteria matrix games. J. Optim. Theory Appl. 68, 463–481 (1991)MathSciNetCrossRefMATH Ghose, D.: A necessary and sufficient condition for pareto-optimal security strategies in multicriteria matrix games. J. Optim. Theory Appl. 68, 463–481 (1991)MathSciNetCrossRefMATH
11.
Zurück zum Zitat Lozovanu, D., Solomon, D., Zelikovsky, A.: Multiobjective games and determining pareto-nash equilibria. Buletinul Academiei de Stiinte a Republicii Moldova Matematica 3(49), 115–122 (2005) ISSN 1024-7696MathSciNet Lozovanu, D., Solomon, D., Zelikovsky, A.: Multiobjective games and determining pareto-nash equilibria. Buletinul Academiei de Stiinte a Republicii Moldova Matematica 3(49), 115–122 (2005) ISSN 1024-7696MathSciNet
13.
14.
Zurück zum Zitat Voorneveld, M.: Pareto-optimal security strategies as minimax strategies of a standard matrix game. J. Optim. Theory Appl. 102(1), 203–210 (1999)MathSciNetCrossRefMATH Voorneveld, M.: Pareto-optimal security strategies as minimax strategies of a standard matrix game. J. Optim. Theory Appl. 102(1), 203–210 (1999)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Ying, Z., Hanping, H., Wenxuan, G.: Network security transmission based on bimatrix game theory. Wuhan Univ. J. Nat. Sci. 11(3), 617–620 (2006)CrossRef Ying, Z., Hanping, H., Wenxuan, G.: Network security transmission based on bimatrix game theory. Wuhan Univ. J. Nat. Sci. 11(3), 617–620 (2006)CrossRef
17.
Zurück zum Zitat Henning, R.R.: Security service level agreements: quantifiable security for the enterprise? In: Proceedings of the 1999 Workshop on New Security Paradigms, pp. 54–60, ACM (1999) Henning, R.R.: Security service level agreements: quantifiable security for the enterprise? In: Proceedings of the 1999 Workshop on New Security Paradigms, pp. 54–60, ACM (1999)
18.
Zurück zum Zitat Righi, R.R., Pelissari, F., Westphall, C.: Sec-SLA: specification and validation of metrics to security service level agreements. In: IV Workshop on Computer System Security, pp. 199–210. SBC Press, Porto Alegre, Brazil (2004) Righi, R.R., Pelissari, F., Westphall, C.: Sec-SLA: specification and validation of metrics to security service level agreements. In: IV Workshop on Computer System Security, pp. 199–210. SBC Press, Porto Alegre, Brazil (2004)
19.
Zurück zum Zitat Moroni, S., Figueroa, N., Jofre, A., Sahai, A., Chen, Y., Iyer, S.: A game-theoretic framework for creating optimal SLA/contract. Technical Report HPL-2007-126. HP Laboratories, Palo Alto (2007) Moroni, S., Figueroa, N., Jofre, A., Sahai, A., Chen, Y., Iyer, S.: A game-theoretic framework for creating optimal SLA/contract. Technical Report HPL-2007-126. HP Laboratories, Palo Alto (2007)
20.
Zurück zum Zitat Figueroa, C., Figueroa, N., Jofre, A., Sahai, A., Chen, Y., Iyer, S.: A game theoretic framework for SLA negotiation. Technical Report HPL-2008-5. HP Laboratories, Palo Alto (2008) Figueroa, C., Figueroa, N., Jofre, A., Sahai, A., Chen, Y., Iyer, S.: A game theoretic framework for SLA negotiation. Technical Report HPL-2008-5. HP Laboratories, Palo Alto (2008)
21.
Zurück zum Zitat Zheng, X., Martin, P., Powley, W., Brohman, K.: Applying bargaining game theory to web services negotiation. In: IEEE Interantional Conference on Services Computing (SCC), pp. 218–225 (2010) Zheng, X., Martin, P., Powley, W., Brohman, K.: Applying bargaining game theory to web services negotiation. In: IEEE Interantional Conference on Services Computing (SCC), pp. 218–225 (2010)
22.
Zurück zum Zitat Pouyllau, H., Douville, R.: End-to-end QoS negotiation in network federations. In: Network Operations and Management Symposium Workshops (NOMS) IEEE/IFIP, pp. 173–176 (2010) Pouyllau, H., Douville, R.: End-to-end QoS negotiation in network federations. In: Network Operations and Management Symposium Workshops (NOMS) IEEE/IFIP, pp. 173–176 (2010)
23.
Zurück zum Zitat Hasselmeyer, P., Mersch, H., Koller, B., Quyen, H., Schubert, L., Wieder, P.: Implementing an SLA negotiation framework. In Proceedings of the eChallenges Conference (e-2007), vol. 4, pp. 154–161. IOS Press, The Hague, The Netherlands (2007) Hasselmeyer, P., Mersch, H., Koller, B., Quyen, H., Schubert, L., Wieder, P.: Implementing an SLA negotiation framework. In Proceedings of the eChallenges Conference (e-2007), vol. 4, pp. 154–161. IOS Press, The Hague, The Netherlands (2007)
24.
Zurück zum Zitat Hudert, S., Ludwig, H., Wirtz, G.: Negotiating SLAs—an approach for a generic negotiation framework for WS-agreement. J. Grid Comput. 7, 225–246 (2009)CrossRef Hudert, S., Ludwig, H., Wirtz, G.: Negotiating SLAs—an approach for a generic negotiation framework for WS-agreement. J. Grid Comput. 7, 225–246 (2009)CrossRef
25.
Zurück zum Zitat Sommers, J., Barford, P., Duffield, N., Ron, A.: Multiobjective monitoring for SLA compliance. IEEE/ACM Trans. Netw. 18, 652–665 (2010)CrossRef Sommers, J., Barford, P., Duffield, N., Ron, A.: Multiobjective monitoring for SLA compliance. IEEE/ACM Trans. Netw. 18, 652–665 (2010)CrossRef
26.
Zurück zum Zitat Aparecida de Chaves, S., Becker Westphall, C., Rodrigo Lamin, F.: SLA perspective in security management for cloud computing. In: International Conference on Networking and Services, pp. 212–217 (2010) Aparecida de Chaves, S., Becker Westphall, C., Rodrigo Lamin, F.: SLA perspective in security management for cloud computing. In: International Conference on Networking and Services, pp. 212–217 (2010)
27.
Zurück zum Zitat Kaminski, H., Perry, M.: A framework for automatic SLA creation. Technical Report. The University of Western Ontario, Computer Science Faculty Publications (2008) Kaminski, H., Perry, M.: A framework for automatic SLA creation. Technical Report. The University of Western Ontario, Computer Science Faculty Publications (2008)
Metadaten
Titel
On Game-Theoretic Network Security Provisioning
Publikationsdatum
01.03.2013
Erschienen in
Journal of Network and Systems Management / Ausgabe 1/2013
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-012-9229-1

Weitere Artikel der Ausgabe 1/2013

Journal of Network and Systems Management 1/2013 Zur Ausgabe

Premium Partner