Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced state variables, threat and tolerability. A Lanchester-type equations is used to present the dynamics of threat-tolerability due to contradictory behavior of insider and adversary. The main advantage of the proposed method is that it could help to optimize the two side player’s strategies and actions during the game period based on threat-tolerability dynamic. As the game progresses each player observes game position, i.e., the threat level for targets and tolerability level for insider and tries to schedule its resources to influence final game’ profits. Player could resolve offensive, defensive and maneuvering share on total available resources. Deciding on extent resources used for each strategy can be considered as control input for each player to change game’s profits. A simple tracking scenario is used to demonstrate how threat and tolerability dynamics could be used as a tool for optimal resource assignment.
Authors and Affiliations
saeed kamelian, Ali Karimpour, Naser Pariz
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs
In this paper, a new algorithm called Motion Coding Gravitational Search Algorithm (MGSA) is proposed to find a moving target using a unmanned aerial vehicles (UAVs). Using the laws of physics and the properties of the e...
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning
The presence of misbehaving users in Cognitive Radio Networks (CRN) can disrupt the process of spectrum sensing and detecting the status of the Primary User (PU). In order to reduce the destructive effect of this group o...
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks
In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely dete...
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis
Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting...
A Malware Classification Method Using visualization and Word Embedding Features
With the explosive growth of threats to Internet security, malware visualization in malware classification has become a promising study area in security and machine learning. This paper proposes a visualization method fo...