Ogundele Samuel - Academia.edu (original) (raw)
Uploads
Papers by Ogundele Samuel
Journal of Computer Engineering & Information Technology, 2013
Existing computer security techniques lack the quantitative decision framework required to defend... more Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators). Stochastic security games are a probabilistic approach appropriate for studying particularly complex networks where attacks often go from a state and proceeds to another according to a probability distribution. A stochastic game-model that views the interaction between malicious users and network administrators as a two-player zerosum game was developed. A binary coding scheme was employed for identifying game states and game transition diagrams were generated to describe possible movements of players. A stochastic algorithm was developed to solve the game and compute the optimal strategies for the players. A simulation of the algorithm was carried out the output analyzed to show the techniques that network administrators can employ to predict adversary's actions, determine vulnerable network assets and suggest optimal defense strategies for the defender.
Journal of Computer Engineering & Information Technology, 2013
Existing computer security techniques lack the quantitative decision framework required to defend... more Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators). Stochastic security games are a probabilistic approach appropriate for studying particularly complex networks where attacks often go from a state and proceeds to another according to a probability distribution. A stochastic game-model that views the interaction between malicious users and network administrators as a two-player zerosum game was developed. A binary coding scheme was employed for identifying game states and game transition diagrams were generated to describe possible movements of players. A stochastic algorithm was developed to solve the game and compute the optimal strategies for the players. A simulation of the algorithm was carried out the output analyzed to show the techniques that network administrators can employ to predict adversary's actions, determine vulnerable network assets and suggest optimal defense strategies for the defender.