All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F15%3A00234339" target="_blank" >RIV/68407700:21230/15:00234339 - isvavai.cz</a>

  • Result on the web

    <a href="http://dl.acm.org/citation.cfm?id=2773429" target="_blank" >http://dl.acm.org/citation.cfm?id=2773429</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs

  • Original language description

    In network security hardening a network administrator may need to use limited resources (such as honeypots) to harden a network against possible attacks. Attack graphs are a common formal model used to represent possible attacks. However, most existing works on attack graphs do not consider the reactions of attackers to different defender strategies. We introduce a game-theoretic model of the joint problem where attacker?s strategies are represented using attack graphs, and defender?s strategies are represented as modifications of the attack graph. The attack graphs we use allow for sequential attack actions with associated costs and probabilities of success/failure. We present an algorithm for an computing attack policy that maximizes attacker?s expected reward and empirical results demonstrating our methods on a case study network.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    V - Vyzkumna aktivita podporovana z jinych verejnych zdroju

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Autonomous Agents and Multiagent Systems

  • ISBN

    978-1-4503-3771-7

  • ISSN

    1548-8403

  • e-ISSN

  • Number of pages

    2

  • Pages from-to

    1773-1774

  • Publisher name

    IFAAMAS

  • Place of publication

    County of Richland

  • Event location

    Istanbul

  • Event date

    May 4, 2015

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article