TY - GEN
T1 - Diversity and system security
T2 - 33rd Annual IEEE Military Communications Conference, MILCOM 2014
AU - Brahma, Swastik
AU - Kwiat, Kevin
AU - Varshney, Pramod K.
AU - Kamhoua, Charles
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/11/13
Y1 - 2014/11/13
N2 - It has been argued that systems that are comprised of similar components (i.e., A monoculture) are more prone to attacks than a system that exhibits diversity. But it is not currently clear how much diversity is needed and how to leverage the underlying diversity in the design space. Here we attempt to study these issues using a Game Theoretic model comprised of multiple systems and an attacker. The model illustrates how the concept of the Nash Equilibrium provides a theoretical framework for designing strategic security solutions and how the mixed strategy solution space provides a conceptual basis for defining optimal randomization techniques that can exploit the underlying diversity. The paper also studies how strategic behavior influences the diversity and vulnerability of an overall system. Simulation results provide further insights into the effectiveness of our solution approach and the dynamics of strategic interaction in the context of system security.
AB - It has been argued that systems that are comprised of similar components (i.e., A monoculture) are more prone to attacks than a system that exhibits diversity. But it is not currently clear how much diversity is needed and how to leverage the underlying diversity in the design space. Here we attempt to study these issues using a Game Theoretic model comprised of multiple systems and an attacker. The model illustrates how the concept of the Nash Equilibrium provides a theoretical framework for designing strategic security solutions and how the mixed strategy solution space provides a conceptual basis for defining optimal randomization techniques that can exploit the underlying diversity. The paper also studies how strategic behavior influences the diversity and vulnerability of an overall system. Simulation results provide further insights into the effectiveness of our solution approach and the dynamics of strategic interaction in the context of system security.
UR - http://www.scopus.com/inward/record.url?scp=84912534371&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84912534371&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2014.30
DO - 10.1109/MILCOM.2014.30
M3 - Conference contribution
AN - SCOPUS:84912534371
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 146
EP - 151
BT - Proceedings - 2014 IEEE Military Communications Conference
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 6 October 2014 through 8 October 2014
ER -