Please use this identifier to cite or link to this item: https://ktisis.cut.ac.cy/handle/10488/14776
Title: Network security validation using game theory
Authors: Papadopoulou, Vicky 
Gregoriades, Andreas 
Keywords: Game theory;Network security;Non-functional requirements;Future networks
Category: Computer and Information Sciences
Field: Social Sciences
Issue Date: 2009
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume 5872 LNCS, 2009, Pages 259-266 On the Move to Meaningful Internet Systems, OTM 2009: ADI 2009, CAMS 2009, EI2N 2009, ISDE 2009, IWSSA 2009, MONET 2009, OnToContent 2009, ODIS 2009, ORM 2009, OTM Academy 2009, SWWS 2009, SEMELS 2009, Beyond SAWSDL 2009, COMBEK 2009; Vilamoura; Portugal; 1 November 2009 through 6 November 2009; Code 83278
Journal: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 
Conference: On the Move to Meaningful Internet Systems 
Abstract: Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
URI: https://ktisis.cut.ac.cy/handle/10488/14776
ISBN: 3642052894
ISSN: 2-s2.0-78650721517
03029743
https://api.elsevier.com/content/abstract/scopus_id/78650721517
DOI: 10.1007/978-3-642-05290-3_37
Rights: © Springer-Verlag 2009.
Type: Conference Papers
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers - poster -presentation

Show full item record

SCOPUSTM   
Citations 50

1
checked on Feb 23, 2020

Page view(s)

20
Last Week
0
Last month
5
checked on Feb 28, 2020

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.