Playing hide-and-seek: An abstract game for cyber security

Martin Chapman, Gareth Tyson, Peter McBurney, Michael Luck, Simon Parsons

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

8 Citations (Scopus)

Abstract

In order to begin to solve many of the problems in the domain of cyber security, they must first be transformed into abstract representations, free of complexity and paralysing technical detail. We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek. The tools required in this game - such as strategic search and an appreciation of an opponent's likely strategies - are very similar to the tools required in a number of cyber security applications, and thus developments in strategies for this game can certainly benefit the domain. In this paper we consider hide-and-seek as a formal game, and consider in depth how it is allegorical to the cyber domain, particularly in the problems of attack attribution and attack pivoting. Using this as motivation, we consider the relative performance of several hide and seek strategies using an agent-based simulation model, and present our findings as an initial insight into how to proceed with the solution of real cyber issues.
Original languageEnglish
Title of host publicationACM International Conference Proceeding Series
Place of PublicationNew York
PublisherAssociation for Computing Machinery
ISBN (Print) 978-1-4503-2728-2
DOIs
Publication statusPublished - 2014
Event1st International Workshop on Agents and CyberSecurity, ACySE 2014 - Held at AAMAS 2014 - Paris, France
Duration: 5 May 20145 May 2014

Conference

Conference1st International Workshop on Agents and CyberSecurity, ACySE 2014 - Held at AAMAS 2014
Country/TerritoryFrance
CityParis
Period5/05/20145/05/2014

Keywords

  • agent-based modelling
  • cyber security
  • hide-and-seek games
  • search games

Fingerprint

Dive into the research topics of 'Playing hide-and-seek: An abstract game for cyber security'. Together they form a unique fingerprint.

Cite this