Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
482396 | European Journal of Operational Research | 2010 | 12 Pages |
Abstract
In this paper, we model a possible deception system with the explicit purpose of enticing unauthorized users and restricting their access to the real system. The proposed model represents a system designer’s defensive actions against intruders in a way that maximizes the difference between the intruders’ cost and the system designer’s cost of system protection. Under the assumption of a dual entity system, the proposed model shows that intruders differ in behavior depending on the system’s vulnerability at the time of intrusion as well as depending on their own economic incentives. The optimal results of the proposed model provide the system designer with insights on how to configure the level of protection for the two systems.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Science (General)
Authors
C. Ryu, R. Sharman, H.R. Rao, S. Upadhyaya,