Diversity and system security: A game theoretic perspective

Swastik Brahma, Kevin Kwiat, Pramod K. Varshney, Charles Kamhoua

Research output: Chapter in Book/Entry/PoemConference contribution

2 Scopus citations

Abstract

It has been argued that systems that are comprised of similar components (i.e., A monoculture) are more prone to attacks than a system that exhibits diversity. But it is not currently clear how much diversity is needed and how to leverage the underlying diversity in the design space. Here we attempt to study these issues using a Game Theoretic model comprised of multiple systems and an attacker. The model illustrates how the concept of the Nash Equilibrium provides a theoretical framework for designing strategic security solutions and how the mixed strategy solution space provides a conceptual basis for defining optimal randomization techniques that can exploit the underlying diversity. The paper also studies how strategic behavior influences the diversity and vulnerability of an overall system. Simulation results provide further insights into the effectiveness of our solution approach and the dynamics of strategic interaction in the context of system security.

Original languageEnglish (US)
Title of host publicationProceedings - 2014 IEEE Military Communications Conference
Subtitle of host publicationAffordable Mission Success: Meeting the Challenge, MILCOM 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages146-151
Number of pages6
ISBN (Electronic)9781479967704
DOIs
StatePublished - Nov 13 2014
Event33rd Annual IEEE Military Communications Conference, MILCOM 2014 - Baltimore, United States
Duration: Oct 6 2014Oct 8 2014

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other33rd Annual IEEE Military Communications Conference, MILCOM 2014
Country/TerritoryUnited States
CityBaltimore
Period10/6/1410/8/14

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Diversity and system security: A game theoretic perspective'. Together they form a unique fingerprint.

Cite this