Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced state variables, threat and tolerability. A Lanchester-type equations is used to present the dynamics of threat-tolerability due to contradictory behavior of insider and adversary. The main advantage of the proposed method is that it could help to optimize the two side player’s strategies and actions during the game period based on threat-tolerability dynamic. As the game progresses each player observes game position, i.e., the threat level for targets and tolerability level for insider and tries to schedule its resources to influence final game’ profits. Player could resolve offensive, defensive and maneuvering share on total available resources. Deciding on extent resources used for each strategy can be considered as control input for each player to change game’s profits. A simple tracking scenario is used to demonstrate how threat and tolerability dynamics could be used as a tool for optimal resource assignment.
Authors and Affiliations
saeed kamelian, Ali Karimpour, Naser Pariz
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment
Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced...
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks
In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely dete...
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm
In most Internet of Things (IoT) applications, network nodes are limited in terms of energy source. Therefore, the need for innovative methods to eliminate energy loss which shortens the life of networks is fully felt in...
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications
Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...
Identify malicious traffic on IoT infrastructure using neural networks and deep learning
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Intern...