Article ID Journal Published Year Pages File Type
482396 European Journal of Operational Research 2010 12 Pages PDF
Abstract

In this paper, we model a possible deception system with the explicit purpose of enticing unauthorized users and restricting their access to the real system. The proposed model represents a system designer’s defensive actions against intruders in a way that maximizes the difference between the intruders’ cost and the system designer’s cost of system protection. Under the assumption of a dual entity system, the proposed model shows that intruders differ in behavior depending on the system’s vulnerability at the time of intrusion as well as depending on their own economic incentives. The optimal results of the proposed model provide the system designer with insights on how to configure the level of protection for the two systems.

Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)
Authors
, , , ,