loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Paul Tavolato 1 ; Robert Luh 1 ; 2 and Sebastian Eresheim 1 ; 2

Affiliations: 1 Research Group Security and Privacy, University of Vienna, Kolingasse 14-16, A-1090 Vienna, Austria ; 2 Department of Computer Science, UAS St. Pölten, A-3100 St. Pölten, Austria

Keyword(s): Cyber Threat Analysis, Game Theory.

Abstract: Cyber threat analysis is crucial to securing modern IT systems. In the ongoing project described here a strictly mathematical method for threat analysis is sketched. The threat landscape between an attacker (hacker) and a defender (system owner) is modeled along the formalisms of stochastic game theory, thus opening the way for a rigorous formal analysis. The key benefit of the project is its applicability to real-world situations. Therefore, the information about possible attack and defense actions is taken from several proven data sources resulting in a large number of actions (173 attack actions and 115 defense actions). We present an adaptation of the so-called Princess-and-Monster game to model the problem. Various problems with the formalization are discussed. To keep the model manageable despite the claim of practicality, it is applied only to specific scenarios mimicking real-world situations.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.118.14.145

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tavolato, P.; Luh, R. and Eresheim, S. (2023). A Game Theoretic Analysis of Cyber Threats. In Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-624-8; ISSN 2184-4356, SciTePress, pages 706-713. DOI: 10.5220/0011792700003405

@conference{icissp23,
author={Paul Tavolato. and Robert Luh. and Sebastian Eresheim.},
title={A Game Theoretic Analysis of Cyber Threats},
booktitle={Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP},
year={2023},
pages={706-713},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011792700003405},
isbn={978-989-758-624-8},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP
TI - A Game Theoretic Analysis of Cyber Threats
SN - 978-989-758-624-8
IS - 2184-4356
AU - Tavolato, P.
AU - Luh, R.
AU - Eresheim, S.
PY - 2023
SP - 706
EP - 713
DO - 10.5220/0011792700003405
PB - SciTePress