Abstract
In order to begin to solve many of the problems in the domain of cyber security, they must first be transformed into abstract representations, free of complexity and paralysing technical detail. We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek. The tools required in this game - such as strategic search and an appreciation of an opponent's likely strategies - are very similar to the tools required in a number of cyber security applications, and thus developments in strategies for this game can certainly benefit the domain. In this paper we consider hide-and-seek as a formal game, and consider in depth how it is allegorical to the cyber domain, particularly in the problems of attack attribution and attack pivoting. Using this as motivation, we consider the relative performance of several hide and seek strategies using an agent-based simulation model, and present our findings as an initial insight into how to proceed with the solution of real cyber issues.
Original language | English |
---|---|
Title of host publication | ACM International Conference Proceeding Series |
Place of Publication | New York |
Publisher | Association for Computing Machinery |
ISBN (Print) | 978-1-4503-2728-2 |
DOIs | |
Publication status | Published - 2014 |
Event | 1st International Workshop on Agents and CyberSecurity, ACySE 2014 - Held at AAMAS 2014 - Paris, France Duration: 5 May 2014 → 5 May 2014 |
Conference
Conference | 1st International Workshop on Agents and CyberSecurity, ACySE 2014 - Held at AAMAS 2014 |
---|---|
Country/Territory | France |
City | Paris |
Period | 5/05/2014 → 5/05/2014 |
Keywords
- agent-based modelling
- cyber security
- hide-and-seek games
- search games