Phân Tích và Thiết Kế Lý Thuyết Trò Chơi cho An Ninh Mạng

Người đăng

Ẩn danh

Thể loại

dissertation

2011

139
0
0

Phí lưu trữ

35 Point

Mục lục chi tiết

ACKNOWLEDGMENTS

ABSTRACT

TABLE OF CONTENTS

1. CHAPTER 1: INTRODUCTION

2. CHAPTER 2: DECENTRALIZED DETECTION WITH CONDITIONALLY DEPENDENT OBSERVATIONS

2.1. Introduction

2.2. Decentralized hypothesis testing with non-i

2.3. The existence of optimal solutions

2.4. A special case with bivariate normal distributions and simulation results

2.5. The majority vote versus the likelihood ratio test

2.6. An algorithm to compute the optimal thresholds

2.7. KDD Cup 1999 data and simulation results

2.8. Conclusion to the chapter

3. CHAPTER 3: FICTITIOUS PLAY FOR NETWORK SECURITY

3.2. Static games and fictitious play

3.3. Classical fictitious play with decision and observation errors

3.4. Algorithms for stochastic fictitious play

3.5. Stochastic fictitious play with decision errors

3.6. Stochastic fictitious play with observation errors

3.7. Limiting Nash equilibrium of stochastic fictitious play

3.8. Stochastic fictitious play with time-invariant frequency update

3.9. Using fictitious play in the pushback mechanism against DDoS attacks

3.10. Conclusion to the chapter

4. CHAPTER 4: STOCHASTIC GAMES FOR SECURITY IN NETWORKS WITH INTERDEPENDENT NODES

4.2. Linear influence network models for security assets and for vulnerabilities

4.3. The network security problem as a nonzero-sum stochastic game

4.4. The network security problem as a zero-sum stochastic game

4.5. Conclusion to the chapter