Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Behavior-based cyber security: Using...
~
Grana, Justin.
Linked to FindBook
Google Book
Amazon
博客來
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection./
Author:
Grana, Justin.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
Description:
125 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: A.
Contained By:
Dissertation Abstracts International77-12A(E).
Subject:
Economic theory. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144198
ISBN:
9781339993607
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
Grana, Justin.
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 125 p.
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: A.
Thesis (Ph.D.)--American University, 2016.
It is undeniable that computer network security is of paramount importance. As unauthorized users increase in sophistication, it is necessary to develop tools to not only respond to their new methods but to anticipate the attack methods before they are deployed. This dissertation will investigate the possibility of employing traditional and behavioral game theory to improve intrusion detection within a computer network as opposed to at a network's firewall. It will first show how to incorporate knowledge of an attacker's behavior to improve detection within a network's perimeter. The second contribution will be to establish a new strategic foundation for attackers and defenders that includes an explicit model of the signal classification problem faced by the defender. This inclusion purifies the mixed-strategy equilibrium results that are ubiquitous in strategic analyses of computer network attack. The final contribution will be to synthesize the statistical method of improving attack detection and the strategic intuition to analyze how boundedly rational (in the form of level-k thinkers) defenders and attackers interact in a noisy network environment. The results show that specifying exactly when and at which hosts an attacker will attack leaves the defender vulnerable to attacks at other "unmonitored" locations. However, if the defender assumes an attacker will exploit all vulnerabilities, then he can optimally define a likelihood ratio attack detector that anticipates the attacker's strategy.
ISBN: 9781339993607Subjects--Topical Terms:
1556984
Economic theory.
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
LDR
:02429nmm a2200277 4500
001
2119415
005
20170619071231.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339993607
035
$a
(MiAaPQ)AAI10144198
035
$a
AAI10144198
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Grana, Justin.
$3
3281291
245
1 0
$a
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
125 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: A.
500
$a
Adviser: Alan Isaac.
502
$a
Thesis (Ph.D.)--American University, 2016.
520
$a
It is undeniable that computer network security is of paramount importance. As unauthorized users increase in sophistication, it is necessary to develop tools to not only respond to their new methods but to anticipate the attack methods before they are deployed. This dissertation will investigate the possibility of employing traditional and behavioral game theory to improve intrusion detection within a computer network as opposed to at a network's firewall. It will first show how to incorporate knowledge of an attacker's behavior to improve detection within a network's perimeter. The second contribution will be to establish a new strategic foundation for attackers and defenders that includes an explicit model of the signal classification problem faced by the defender. This inclusion purifies the mixed-strategy equilibrium results that are ubiquitous in strategic analyses of computer network attack. The final contribution will be to synthesize the statistical method of improving attack detection and the strategic intuition to analyze how boundedly rational (in the form of level-k thinkers) defenders and attackers interact in a noisy network environment. The results show that specifying exactly when and at which hosts an attacker will attack leaves the defender vulnerable to attacks at other "unmonitored" locations. However, if the defender assumes an attacker will exploit all vulnerabilities, then he can optimally define a likelihood ratio attack detector that anticipates the attacker's strategy.
590
$a
School code: 0008.
650
4
$a
Economic theory.
$3
1556984
690
$a
0511
710
2
$a
American University.
$b
Economics.
$3
3177464
773
0
$t
Dissertation Abstracts International
$g
77-12A(E).
790
$a
0008
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144198
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9330033
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login