A Game Theoretic Framework for E-Mail Detection and Forgery Analysis
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and header information, then discuss the email detection and forgery technologies. In this paper, we propose a Detection-Forgery Game (DFG) model and make a classification of players’ strategy with the Operation Complexity (OC). In the DFG model, we regard the interactions between the detector and the forger as a two-player, non-cooperative, non-zero-sum and finite strategic game, and formulate the Nash Equilibrium. The optimal detection and forgery strategies with minimizing cost and maximizing reward will be found by using the model. Finally, we perform empirical experiments to verify the effectiveness and feasibility of the model.
Authors and Affiliations
Long Chen, Yuan Lou, Min Xiao, Zhen-Xing Dong
Optimization based Approach for Content Distribution in Hybrid Mobile Social Networks
This paper presents the new strategy for smooth content distribution in the mobile social network. We proposed a new method, hybrid mobile social network architecture scheme considered as one node of a social community c...
Implementing Project Management Category Process Areas of CMMI Version 1.3 Using Scrum Practices, and Assets
Software development organizations that rely on Capability Maturity Model Integration (CMMI) to assess and improve their processes have realized that agile approaches can provide improvements as well. CMMI and agile meth...
A Comparative Study of Three TDMA Digital Cellular Mobile Systems (GSM, IS-136 NA-TDMA and PDC) Based On Radio Aspect
As mobile and personal communication services and networks involve providing seamless global roaming and improve quality of service to its users, the role of such network for numbering and identification and quality of s...
Sentiment Analysis on Twitter Data using KNN and SVM
Millions of users share opinions on various topics using micro-blogging every day. Twitter is a very popular micro-blogging site where users are allowed a limit of 140 characters; this kind of restriction makes the users...
A Modified Feistel Cipher Involving Modular Arithmetic Addition and Modular Arithmetic Inverse of a Key Matrix
In this investigation, we have modified the Feistel cipher by taking the plaintext in the form of a pair of square matrices. Here we have introduced the operation multiplication with the key matrices and the modular arit...