Skip to main content

Network Security Validation Using Game Theory

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2009 Workshops (OTM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5872))

Abstract

Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks’ infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Crook, R., Ince, D., Lin, L., Nuseibeh, B.: Security requirements Engineering: When Anti-Requirements Hit the Fan. In: Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, pp. 203–205. IEEE Press, Los Alamitos (2002)

    Chapter  Google Scholar 

  2. Gregoriades, A., Sutcliffe, A.: Scenario-Based Assessment of Non-Functional Requirements. IEEE Transactions on Software Engineering 31(5), 392–409 (2005)

    Article  Google Scholar 

  3. van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proceedings of the 26th International Conference on Software Engineering, pp. 148–157. IEEE Press, Los Alamitos (2004)

    Chapter  Google Scholar 

  4. Mavronicolas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A Network Game with Attacker and Protector Entities. Algorithmica. In: Deng, X., Du, D. (eds.) Special Issue with selected papers from the 16th Annual International Symposium on Algorithms and Computation (ISAAC 2005), July 2008, vol. 51(3), pp. 315–341 (2008)

    Google Scholar 

  5. Mavronicolas, M., Michael, L., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: The price of defense. In: Královič, R., Urzyczyn, P. (eds.) MFCS 2006. LNCS, vol. 4162, pp. 717–728. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Nash, J.F.: Non-cooperative Games. Annals of Mathematics 54(2), 286–295 (1951)

    Article  MathSciNet  Google Scholar 

  7. West, D.B.: Introduction to Graph Theory, 2nd edn. Prentice Hall, Englewood Cliffs (2001)

    Google Scholar 

  8. Markham, T., Payne, C.: Security at the Network Edge: A Distributed Firewall Architecture. In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition, June 2001, vol. 1, pp. 279–286 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Papadopoulou, V., Gregoriades, A. (2009). Network Security Validation Using Game Theory. In: Meersman, R., Herrero, P., Dillon, T. (eds) On the Move to Meaningful Internet Systems: OTM 2009 Workshops. OTM 2009. Lecture Notes in Computer Science, vol 5872. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05290-3_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05290-3_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05289-7

  • Online ISBN: 978-3-642-05290-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics