Skip to main content

Towards a Game Theoretic Authorisation Model

  • Conference paper
Decision and Game Theory for Security (GameSec 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6442))

Included in the following conference series:

Abstract

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aghion, P., Tirole, J.: Philippe Aghion and Jean Tirole. Formal and real authority in organizations. Journal of Political Economy 105(1), 1 (1997)

    Article  Google Scholar 

  2. Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceeding of the 42nd IEEE Conference on Decision and Control (CDC) (December 2003)

    Google Scholar 

  3. Bishop, M., Frincke, C.G.D., Greitzer, F.L.: AZALIA: an A to Z Assessment of the Likelihood of Insider Attack (2010)

    Google Scholar 

  4. Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: IEEE Symposium on Security and Privacy, pp. 222–230 (2007)

    Google Scholar 

  5. Funderberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1992)

    Google Scholar 

  6. Gordon, L.A., Loep, M.P., Lucyshyn, W., Richardson, R.: CSI/FBI computer crime and security survey. Technical report, CMP Media, Manhasset, NY (2004)

    Google Scholar 

  7. Holmstrom, B.: Moral hazard and observability. The Bell Journal of Economics 10(1), 74–91 (1979)

    Article  Google Scholar 

  8. Liu, D., Wang, X., Camp, J.L.: Mitigating inadvertent insider threats with incentives, pp. 1–16 (2009)

    Google Scholar 

  9. Liu, D., XiaoFeng, W., Camp, J.L.: Game theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection 1, 75–80 (2008)

    Article  Google Scholar 

  10. Liu, P., Zang, W.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. In: CCS 2003: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 179–189. ACM, New York (2003)

    Google Scholar 

  11. Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: GameNets 2006: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 4. ACM, New York (2006)

    Chapter  Google Scholar 

  12. MITRE Corporation Jason Program Office. Horizontal integration: Broader access models for realizing information dominance. Technical Report JSR-04-132, MITRE Corporation (2004)

    Google Scholar 

  13. Pfleeger, S.L., Predd, J.B., Hunker, J., Bulford, C.: Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security 5(1), 169–179 (2010)

    Article  Google Scholar 

  14. Salim, F., Reid, J., Dawson, E.: Towards authorisation models for secure information sharing: A survey and research agenda. The ISC International Journal of Information Security, ISeCure (2010)

    Google Scholar 

  15. Eugene Schultz, E.: A framework for understanding and predicting insider attacks. Computers & Security 21(6), 526–531 (2002)

    Article  Google Scholar 

  16. Lye, K.w., Wing, J.M.: Game strategies in network security. Int. J. Inf. Sec. 4(1-2), 71–86 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salim, F., Reid, J., Dulleck, U., Dawson, E. (2010). Towards a Game Theoretic Authorisation Model. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds) Decision and Game Theory for Security. GameSec 2010. Lecture Notes in Computer Science, vol 6442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17197-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17197-0_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17196-3

  • Online ISBN: 978-3-642-17197-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics