期刊文献+

基于风险偏好的两种信息安全技术配置策略 被引量:12

Configuration strategy of two information security technologies based on risk preference
在线阅读 下载PDF
导出
摘要 公司和黑客的风险偏好对信息安全技术组合配置策略有重要的影响.应用博弈论建立防火墙和入侵检测系统(IDS)的信息安全模型.结果表明:当公司的期望成本较低时,风险中立型公司更易被入侵;当公司的期望成本较高时,风险厌恶型公司更易被入侵.当黑客的期望收益较低时,风险厌恶型黑客被检测的概率最大;当黑客的期望收益较高时,风险追求型黑客被检测的概率最大.同时,定量研究了防火墙和IDS的防御和检测的经济效用,给出公司是否需要增配另一种信息安全技术,以及公司只能配置一种信息安全技术时的最优策略. There is an important impact on configuration strategy of information security technologies based on risk preference of the firm and hacker. The security model including firewall and intrusion detection system (IDS) was established by game theory. The results show that for the risk-neutral firm, lower expected cost leads to higher probability of intrusion; for the risk-aversion firm, higher expected cost leads to higher probability of intrusion. For the risk-aversion hacker, lower expected benefit leads to higher probability of investigation; for the risk-seeking hacker, higher expected benefit leads to higher probability of investigation. Meanwhile, the protective and detective economics effects of firewall and IDS are respectively studied in quantify, and how to make an optimal strategy is derived if the firm deploys another information security technology, or if the firm only deploys one information security technology.
出处 《系统工程学报》 CSCD 北大核心 2014年第3期324-333,共10页 Journal of Systems Engineering
基金 国家自然科学基金资助项目(71071033) 江苏省2010年度研究生科研创新计划资助项目(CX10B_058Z)
关键词 信息安全经济学 防火墙 入侵检测系统 风险偏好 economics of information systems firewall IDS risk preference
  • 相关文献

参考文献16

  • 1Holden G. Guide to Firewalls and Network Security[M]. Boston: Course Technology, 2004.
  • 2Neumarm P, Porras P. Experience with emerald to date[C]//Proceedings of 1st USENIX Workshop Conference. Santa Clara: Intru- sion Detection Network Monitoring, 1999: 73-80.
  • 3Huseyin C, Srinivasan R. Configuration of detection software: A comparison of decision and game theory approach[J]. Decision Analysis, 2004, 1(3): 131-148.
  • 4Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection[C]//Proceedings of 42nd IEEE Conference Decision and Control. Hawaii: 2003: 2595-2600.
  • 5Ross A, Tyler M. The economics of information security: A survey and open questions[J]. Science, 2006, 314(27): 610-613. 8.
  • 6Chen L, Jean L. A game theoretical framework on intrusion detection in heterogeneous networks[J]. IEEE Transactions on Informa- tion Forensics and Security, 2009, 4(2): 165-17.
  • 7李天目,仲伟俊,梅姝娥.入侵防御系统管理和配置的检查博弈分析[J].系统工程学报,2008,23(5):589-595. 被引量:5
  • 8Hasan C, Huseyin C, Zhang Jun. Security patch management: Share the burden or share the damage[J]. Management science, 2008, 54(4): 657-670.
  • 9冯楠,李敏强,解晶.复杂网络信息系统安全资源优化配置研究[J].系统工程学报,2010,25(2):145-151. 被引量:9
  • 10朱建明,Srinivasan Raghunathan.基于博弈论的信息安全技术评价模型[J].计算机学报,2009,32(4):828-834. 被引量:42

二级参考文献51

共引文献74

同被引文献83

  • 1乐琦,樊治平.区间数互反判断矩阵的一致性分析及排序方法[J].系统工程学报,2010,25(4):459-466. 被引量:16
  • 2李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:20
  • 3兰泽全,王宝德,马汉鹏,徐景德.浅谈如何提高煤矿安全培训的质量[J].煤炭工程,2007,39(5):63-65. 被引量:20
  • 4Liao H J, Lin C H R, Lin Y C, et al. Intrusion detec- tion system: a comprehensive review I J ]- Journal of Network & Computer Applications, 2013, 36( 1 ) : 16 - 24.
  • 5Xenakis C, Panos C, Stavrakakis I. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks[ J]. Computers & Security, 2011, 30 (1) : 63 -80.
  • 6Farooqi A H, Khan F A, Wang J, et al. A novel intru- sion detection framework for wireless sensor networks [J]. Personal and Ubiquitous Computing, 2013, 17 (5) : 907 -919.
  • 7Modi C, Patel D, Bofisaniya B, et al. A survey of intru- sion detection techniques in Cloud [J]- Journal of Net- work and Computer Applications, 2013, 36( 1 ) : 42 -57.
  • 8Wu S X, Banzhaf W. The use of computational intelli- gence in intrusion detection systems: a review [ J ]. Ap- plied Soft Computing, 2010, 10( 1 ) : 1 -35.
  • 9Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems information technology secu- rity architecture [J]. Information Systems Research, 2005, 16 ( 1 ) : 28 - 46.
  • 10Liu S, Zhang D Y, Chu X, et al. A game theoretic ap- proach to optinaize the performance of host-based IDS C ]//IEEE International Conference on Wireless & Mobile Computing, Networking & Communication. Avignon, France, 2008:448-453.

引证文献12

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部