资源描述:
《《agame-theoryapproachtoconfigurationofdetectionsoftwarewithdecisionerrors.》》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、ReliabilityEngineeringandSystemSafety119(2013)35–43ContentslistsavailableatSciVerseScienceDirectReliabilityEngineeringandSystemSafetyjournalhomepage:www.elsevier.com/locate/ressAgame-theoryapproachtoconfigurationofdetectionsoftwarewithdecisionerrorsnXingGao,WeijunZhong,ShueMe
2、iSchoolofEconomicsandManagement,SoutheastUniversity,Nanjing,Jiangsu,ChinaarticleinfoabstractArticlehistory:ThemoderncomputerandcommunicationnetworksthatfirmsrelyonhavebecomemorecomplexdueReceived19July2011totheirdynamic,distributedandheterogeneousfeatures;itisthereforeincreas
3、inglyimportanttoReceivedinrevisedformcharacterizetheinteractionbetweenafirmandausertoensureinformationsecurity.Recently,agame-3May2013theoryapproachhasbeenwidelyemployedtoinvestigatethisissue,includingtheoptimalconfigurationsAccepted3May2013ofthedetectionsoftware.However,forbo
4、ththefirmandtheuser,inaccuraciesmaypersistinthegapAvailableonline17May2013betweenstrategicdecisionsandactualactions,duetotheeffectsofirrationalityandtheerror-proneKeywords:natureofthedevicesthatcarrytheircommands.ThispaperanalyzestheeffectsofdecisionerrorsontheDetectionsoftwa
5、reoptimalstrategiesofboththefirmandtheuserand,inparticular,ontheoptimalconfigurationsoftheIntrusiondetectionsystemsdetectionsoftware.WefinallydemonstratethatdecisionerrorscanpromoteseveralpureequilibriumGame-theorystrategiesandthatfine-tuningtheseconfigurationsquicklybecomesdiffic
6、ult.Furthermore,wefindthatDecisionerrorsdecisionerrorscandrasticallyinfluencetheoptimalconfigurationsandexpectedcostsforafirm.&2013ElsevierLtd.Allrightsreserved.1.IntroductionForexample,Refs.[8–10]giveagame-theoryanalysisoftheoptimalconfigurationsforsecuritydevices,whereasRefs.[1
7、2,14,15]provideaAnincreaseintheelectroniccollaborationbetweenvariousorga-gameframeworktodiscusstheinvestmentofinformationsecurity.nizationsandeconomicentitieshasledtosophisticatedcomputerandFurthermore,therehavebeenmanygame-theoryapplicationsinthecommunicationnetworks.Cyber-
8、attacksfrequentlytakeadvantageofsecurityliterature[4–7,16–23,27–30].theprop