publication . Part of book or chapter of book . Other literature type . 2009

Blue versus Red: Towards a Model of Distributed Security Attacks

Fultz, Neal; Grossklags, Jens;
Open Access
  • Published: 01 Jan 2009
  • Publisher: Springer Berlin Heidelberg
We develop a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attackers benefit from the successful compromise of target systems, however, may suffer penalties for increased attack activities. Defenders weigh the force of an attack against the cost of security. We consider security decision-making in tightly and loosely coupled networks and allow defense expenditures in protection and self-insurance technologies.
ACM Computing Classification System: ComputingMilieux_LEGALASPECTSOFCOMPUTING
free text keywords: Game theory, Cloud computing security, Computer science, Distributed security, Compromise, media_common.quotation_subject, media_common, Computer security, computer.software_genre, computer, Economics of security, Security through obscurity, Internet privacy, business.industry, business, Self-insurance
Related Organizations
Download fromView all 2 versions
Part of book or chapter of book
Provider: UnpayWall
Other literature type . 2009
Provider: Datacite
Part of book or chapter of book
Provider: Crossref
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue