Development and analysis of game-theoretical models of security systems agents interaction

A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics,...

Full description

Bibliographic Details
Main Authors: Serhii Yevseiev, Oleksandr Milov, Stanislav Milevskyi, Oleksandr Voitko, Maksym Kasianenko, Yevgen Melenti, Serhii Pohasii, Hrygorii Stepanov, Oleksandr Turinskyi, Serhii Faraon
Format: Article
Language:English
Published: PC Technology Center 2020-04-01
Series:Eastern-European Journal of Enterprise Technologies
Subjects:
Online Access:http://journals.uran.ua/eejet/article/view/201418
id doaj-f1bd2a071c8d41ef84dca3683c2b50ca
record_format Article
collection DOAJ
language English
format Article
sources DOAJ
author Serhii Yevseiev
Oleksandr Milov
Stanislav Milevskyi
Oleksandr Voitko
Maksym Kasianenko
Yevgen Melenti
Serhii Pohasii
Hrygorii Stepanov
Oleksandr Turinskyi
Serhii Faraon
spellingShingle Serhii Yevseiev
Oleksandr Milov
Stanislav Milevskyi
Oleksandr Voitko
Maksym Kasianenko
Yevgen Melenti
Serhii Pohasii
Hrygorii Stepanov
Oleksandr Turinskyi
Serhii Faraon
Development and analysis of game-theoretical models of security systems agents interaction
Eastern-European Journal of Enterprise Technologies
game theory
cybersecurity
stackelberg games
nash games
game equilibrium
strategy
author_facet Serhii Yevseiev
Oleksandr Milov
Stanislav Milevskyi
Oleksandr Voitko
Maksym Kasianenko
Yevgen Melenti
Serhii Pohasii
Hrygorii Stepanov
Oleksandr Turinskyi
Serhii Faraon
author_sort Serhii Yevseiev
title Development and analysis of game-theoretical models of security systems agents interaction
title_short Development and analysis of game-theoretical models of security systems agents interaction
title_full Development and analysis of game-theoretical models of security systems agents interaction
title_fullStr Development and analysis of game-theoretical models of security systems agents interaction
title_full_unstemmed Development and analysis of game-theoretical models of security systems agents interaction
title_sort development and analysis of game-theoretical models of security systems agents interaction
publisher PC Technology Center
series Eastern-European Journal of Enterprise Technologies
issn 1729-3774
1729-4061
publishDate 2020-04-01
description A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope
topic game theory
cybersecurity
stackelberg games
nash games
game equilibrium
strategy
url http://journals.uran.ua/eejet/article/view/201418
work_keys_str_mv AT serhiiyevseiev developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT oleksandrmilov developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT stanislavmilevskyi developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT oleksandrvoitko developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT maksymkasianenko developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT yevgenmelenti developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT serhiipohasii developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT hrygoriistepanov developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT oleksandrturinskyi developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
AT serhiifaraon developmentandanalysisofgametheoreticalmodelsofsecuritysystemsagentsinteraction
_version_ 1724821255487488000
spelling doaj-f1bd2a071c8d41ef84dca3683c2b50ca2020-11-25T02:32:08ZengPC Technology CenterEastern-European Journal of Enterprise Technologies1729-37741729-40612020-04-0124 (104)152910.15587/1729-4061.2020.201418201418Development and analysis of game-theoretical models of security systems agents interactionSerhii Yevseiev0Oleksandr Milov1Stanislav Milevskyi2Oleksandr Voitko3Maksym Kasianenko4Yevgen Melenti5Serhii Pohasii6Hrygorii Stepanov7Oleksandr Turinskyi8Serhii Faraon9Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166National Defence University of Ukraine named after Ivan Cherniakhovskyi Povitroflotskiy ave., 28, Kyiv, Ukraine, 03049National Defence University of Ukraine named after Ivan Cherniakhovskyi Povitroflotskiy ave., 28, Kyiv, Ukraine, 03049Juridical Personnel Training Institute for the Security Service of Ukraine Yaroslav Mudryi National Law University Myronosytska str., 71, Kharkiv, Ukraine, 61002Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166National Defence University of Ukraine named after Ivan Cherniakhovskyi Povitroflotskiy ave., 28, Kyiv, Ukraine, 03049Ivan Kozhedub Kharkiv National Air Force University Sumska str., 77/79, Kharkiv, Ukraine, 61023National Defence University of Ukraine named after Ivan Cherniakhovskyi Povitroflotskiy ave., 28, Kyiv, Ukraine, 03049A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scopehttp://journals.uran.ua/eejet/article/view/201418game theorycybersecuritystackelberg gamesnash gamesgame equilibriumstrategy