語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Behavior-based cyber security: Using...
~
Grana, Justin.
FindBook
Google Book
Amazon
博客來
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection./
作者:
Grana, Justin.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
面頁冊數:
125 p.
附註:
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: A.
Contained By:
Dissertation Abstracts International77-12A(E).
標題:
Economic theory. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144198
ISBN:
9781339993607
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
Grana, Justin.
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 125 p.
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: A.
Thesis (Ph.D.)--American University, 2016.
It is undeniable that computer network security is of paramount importance. As unauthorized users increase in sophistication, it is necessary to develop tools to not only respond to their new methods but to anticipate the attack methods before they are deployed. This dissertation will investigate the possibility of employing traditional and behavioral game theory to improve intrusion detection within a computer network as opposed to at a network's firewall. It will first show how to incorporate knowledge of an attacker's behavior to improve detection within a network's perimeter. The second contribution will be to establish a new strategic foundation for attackers and defenders that includes an explicit model of the signal classification problem faced by the defender. This inclusion purifies the mixed-strategy equilibrium results that are ubiquitous in strategic analyses of computer network attack. The final contribution will be to synthesize the statistical method of improving attack detection and the strategic intuition to analyze how boundedly rational (in the form of level-k thinkers) defenders and attackers interact in a noisy network environment. The results show that specifying exactly when and at which hosts an attacker will attack leaves the defender vulnerable to attacks at other "unmonitored" locations. However, if the defender assumes an attacker will exploit all vulnerabilities, then he can optimally define a likelihood ratio attack detector that anticipates the attacker's strategy.
ISBN: 9781339993607Subjects--Topical Terms:
1556984
Economic theory.
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
LDR
:02429nmm a2200277 4500
001
2119415
005
20170619071231.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339993607
035
$a
(MiAaPQ)AAI10144198
035
$a
AAI10144198
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Grana, Justin.
$3
3281291
245
1 0
$a
Behavior-based cyber security: Using traditional and behavioral game theory to improve attack detection.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
125 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: A.
500
$a
Adviser: Alan Isaac.
502
$a
Thesis (Ph.D.)--American University, 2016.
520
$a
It is undeniable that computer network security is of paramount importance. As unauthorized users increase in sophistication, it is necessary to develop tools to not only respond to their new methods but to anticipate the attack methods before they are deployed. This dissertation will investigate the possibility of employing traditional and behavioral game theory to improve intrusion detection within a computer network as opposed to at a network's firewall. It will first show how to incorporate knowledge of an attacker's behavior to improve detection within a network's perimeter. The second contribution will be to establish a new strategic foundation for attackers and defenders that includes an explicit model of the signal classification problem faced by the defender. This inclusion purifies the mixed-strategy equilibrium results that are ubiquitous in strategic analyses of computer network attack. The final contribution will be to synthesize the statistical method of improving attack detection and the strategic intuition to analyze how boundedly rational (in the form of level-k thinkers) defenders and attackers interact in a noisy network environment. The results show that specifying exactly when and at which hosts an attacker will attack leaves the defender vulnerable to attacks at other "unmonitored" locations. However, if the defender assumes an attacker will exploit all vulnerabilities, then he can optimally define a likelihood ratio attack detector that anticipates the attacker's strategy.
590
$a
School code: 0008.
650
4
$a
Economic theory.
$3
1556984
690
$a
0511
710
2
$a
American University.
$b
Economics.
$3
3177464
773
0
$t
Dissertation Abstracts International
$g
77-12A(E).
790
$a
0008
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144198
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9330033
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入