Skip to main content

2020 | OriginalPaper | Buchkapitel

9. Optimal Inspection Plans

verfasst von : Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu

Erschienen in: Cyber-Security in Critical Infrastructures

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we consider games for the computation of optimal strategies of how, how often, and when to inspect along a production line, or general industrial process. We review basic concepts of statistical tests, conducted whenever the defender chooses its action to “inspect”, and to understand cheating strategies for the adversary trying to escape detection along the statistical test. This non-detection game is then embedded into an outer sequential game over several stages of inspection, accounting for limited resources and possibilities of the defender to check repeatedly. We also consider inspections as a defense pattern against advanced persistent threat (APT), with two models suitable for two distinct type of APTs: the FlipIt game is discussed as a model when the APT’s goal is to gain longest possible control over an infrastructure, without wishing to damage or destroy it permanently. Complementary to this is the Cut-The-Rope game about defending against an APT whose goal is hitting a vital asset and to destroy or at least permanently damage a critical infrastructure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Avenhaus R, von Stengel B, Zamir S (2002) Inspection games: 51. In: Aumann RJ, Hart S (eds) Handbook of game theory with economic applications, vol 3. Elsevier, Amsterdam, pp 1947–1987 Avenhaus R, von Stengel B, Zamir S (2002) Inspection games: 51. In: Aumann RJ, Hart S (eds) Handbook of game theory with economic applications, vol 3. Elsevier, Amsterdam, pp 1947–1987
2.
Zurück zum Zitat Benford F (1938) The law of anomalous numbers. Proc Am Philos Soc 78(4):551–572MATH Benford F (1938) The law of anomalous numbers. Proc Am Philos Soc 78(4):551–572MATH
7.
Zurück zum Zitat Jajodia S, Noel S, O’Berry B (2005) Topological analysis of network attack vulnerability. In: Kumar V., Srivastava J., Lazarevic A. (eds) Managing Cyber Threats. Massive Computing, vol 5. Springer, Boston, MA Jajodia S, Noel S, O’Berry B (2005) Topological analysis of network attack vulnerability. In: Kumar V., Srivastava J., Lazarevic A. (eds) Managing Cyber Threats. Massive Computing, vol 5. Springer, Boston, MA
9.
Zurück zum Zitat Lehmann EL, Romano JP (2005) Testing statistical hypotheses. Springer texts in statistics, 3rd edn. Springer, New York Lehmann EL, Romano JP (2005) Testing statistical hypotheses. Springer texts in statistics, 3rd edn. Springer, New York
11.
Zurück zum Zitat Nigrini MJ (2002) The detection of income tax evasion through an analysis of digital distributions. Ph.D. thesis, University of Cincinnati Nigrini MJ (2002) The detection of income tax evasion through an analysis of digital distributions. Ph.D. thesis, University of Cincinnati
13.
Zurück zum Zitat Rass S, König S, Panaousis E (2019) Cut-The-Rope: a game of stealthy intrusion. In: Alpcan T, Vorobeychik Y, Baras JS, Dán G (eds) Decision and game theory for security. Springer International Publishing, Cham, pp 404–416CrossRef Rass S, König S, Panaousis E (2019) Cut-The-Rope: a game of stealthy intrusion. In: Alpcan T, Vorobeychik Y, Baras JS, Dán G (eds) Decision and game theory for security. Springer International Publishing, Cham, pp 404–416CrossRef
15.
Zurück zum Zitat Siddiqi N (2017) Intelligent credit scoring: building and implementing better credit risk scorecards, 2nd edn. Wiley, HobokenCrossRef Siddiqi N (2017) Intelligent credit scoring: building and implementing better credit risk scorecards, 2nd edn. Wiley, HobokenCrossRef
16.
Zurück zum Zitat Singhal A, Ou X (2011) Security risk analysis of enterprise networks using probabilistic attack graphs. Technical report, National Institute of Standards and Technology (NIST). NIST Interagency Report 7788 Singhal A, Ou X (2011) Security risk analysis of enterprise networks using probabilistic attack graphs. Technical report, National Institute of Standards and Technology (NIST). NIST Interagency Report 7788
Metadaten
Titel
Optimal Inspection Plans
verfasst von
Stefan Rass
Stefan Schauer
Sandra König
Quanyan Zhu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-46908-5_9

Premium Partner