TAILIEUCHUNG - Towards a Cooperative Defense Model Against Network Security Attacks

There are a number of strategies that allow an attacker to break the circle of trust and get into people’s contact lists. A lot of social network users do not realize that their contact lists really is a circle of trust and by adding somebody they do not know—celebrities included—they are opening their data to untrusted parties. Some sites do not have privacy controls in place, or the ones they have do not protect all user data. Even if they do have comprehensive privacy controls, the user is often not obligated to select who can access his/her data and is often. | Towards a Cooperative Defense Model Against Network Security Attacks Harikrishna Narasimhan1 Venkatanathan Varadarajan1 C. Pandu Rangan2 1 Department of Computer Science and Engineering College of Engineering Guindy Anna University Chennai India. nhari88 venk1989 @ 2Theoretical Computer Science Laboratory Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India. prangan@ Abstract. It is widely acknowledged that internet security issues can be handled better through cooperation rather than competition. We introduce a game theoretic cooperative model against network security attacks where users form coalitions and invest in joint protection. We analyze coalition formation in three canonical security games described in a previous work by Grossklags et al. Our findings reveal that the success of cooperative security efforts depends on the nature of the attack and the attitude of the defenders. Keywords Economics of Security Cooperative Game Theory Coalition Partition Function Game PFG Core 1 Introduction Spam is a perennial problem in today s internet and has caught the attention of corporate giants like Google and Yahoo. It is widely acknowledged that the best way to fight spam is through cooperation and not competition . In fact the Organization for Economic Co-operation and Development recommends international cooperation in the battle against spam 1 . A recent study shows that such cross-border cooperation can deter cyber crimes to a substantial extent 34 . In 26 Moore finds evidence of non-cooperation among defenders in the fight against phishing and highlights the need for cooperative information sharing. Cooperation is also warranted in the detection 7 5 and mitigation 27 22 of DDoS attacks. Cooperative intrusion detection systems aim at achieving high detection rates through exchange of attack information among various sites. Cooperative security has also been employed against attacks in peer-to-peer

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.