A Game Theoretic Model for Network Virus Protection

被引:0
|
作者
Khammassi, Iyed [1 ,2 ]
Elazouzi, Rachid [1 ]
Haddad, Majed [1 ]
Mabrouki, Issam [2 ]
机构
[1] Univ Avignon, F-84000 Avignon, France
[2] Univ Manouba, Manouba, Tunisia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security is crucial for information systems. In a company, security management is traditionally controlled via a centralized single-point. However, when we deal with multiple computer systems interconnected in a wide area networks (WAN), the use of a central authority for security management is completely meaningless. In this paper, we propose a distributed decision-making designed to thwart viruses in a WAN. A key aspect is whether owners of devices are willing to update their anti-virus in order to protect their computers or not to pay for an anti-virus update and take the risk to be contaminated. Given the fact that computers are interconnected via networks and the Internet, the risk of being infected does not only depend on each computer's strategy, but also on the strategies chosen by other computers in the network. This makes the virus protection problem much more challenging. To do so, we model the interaction between nodes as a non-cooperative game in which each node decides individually whether to update the anti-virus or not. The virus spread is assumed to follow a biologically inspired epidemic model in which the dynamic of sources that disseminate the virus evolves as function of the popularity of virus using the influence linear threshold model. We first provide a full characterization of the equilibria of the game and then we investigate the impact of the update cost. In particular, we study the performance of the strategies at the equilibrium in terms of the update cost and the network size on both the security management system and the anti-virus producers. These results give some helpful insights on how secure is decentralizing antivirus update decisions.
引用
收藏
页码:2460 / 2465
页数:6
相关论文
共 50 条
  • [11] A game theoretic model for cellular network operators' cooperation under government intervention
    Fander, Atieh
    Yaghoubi, Saeed
    Tajik, Javad
    RAIRO-OPERATIONS RESEARCH, 2022, 56 (02) : 813 - 829
  • [12] An evolutionary game-theoretic model of network revenue management in oligopolistic competition
    Friesz, Terry L.
    Mookherjee, Reetabrata
    Rigdon, Matthew A.
    JOURNAL OF REVENUE AND PRICING MANAGEMENT, 2005, 4 (02) : 156 - 173
  • [13] Game theoretic model for power optimization in next-generation heterogeneous network
    S. Amalorpava Mary Rajee
    A. Merline
    M. M. Yamuna Devi
    Signal, Image and Video Processing, 2023, 17 : 3721 - 3729
  • [14] Game theoretic model for power optimization in next-generation heterogeneous network
    Rajee, S. Amalorpava Mary
    Merline, A.
    Devi, M. M. Yamuna
    SIGNAL IMAGE AND VIDEO PROCESSING, 2023, 17 (07) : 3721 - 3729
  • [15] An evolutionary game-theoretic model of network revenue management in oligopolistic competition
    Terry L Friesz
    Reetabrata Mookherjee
    Matthew A Rigdon
    Journal of Revenue and Pricing Management, 2005, 4 (2) : 156 - 173
  • [16] A Game Theoretic Competitive Supply Chain Network Model with Green Investments and Labour
    Debono K.P.
    Kontorinak M.
    Sciortino M.
    Mendel, 2023, 29 (01) : 25 - 36
  • [17] Game-Theoretic Strategy for Personalized Privacy Protection
    Yu, Chao
    Shi, Yuliang
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (04): : 123 - 138
  • [18] Game Theoretic Formation of a Centrality Based Network
    Tatko, Ryan
    Griffin, Christopher
    PROCEEDINGS OF THE 2012 ASE INTERNATIONAL CONFERENCE ON SOCIAL INFORMATICS (SOCIALINFORMATICS 2012), 2012, : 56 - 61
  • [19] Game theoretic models for detecting network intrusions
    Otrok, Hadi
    Mehrandish, Mona
    Assi, Chadi
    Debbabi, Mourad
    Bhattacharya, Prabir
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 1934 - 1944
  • [20] A GAME-THEORETIC APPROACH TO NETWORK EQUILIBRIUM
    HAURIE, A
    MARCOTTE, P
    MATHEMATICAL PROGRAMMING STUDY, 1986, 26 : 252 - 255