مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

622
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

MODELING AND ANALYSIS OF COMPETITION BETWEEN MALWARE AUTHORS AND SECURITY ANALYSTS, USING GAME THEORY

Pages

  19-41

Abstract

 Modeling tools describe the real world complex problems well and might help analysts to explore constructive solutions for resolving the problems. In this paper, competition between MALWARE authors and security analysts is modeled and analyzed, using Graph Model for Conflict Resolution which is a comprehensive methodology in a non-quantitative non-cooperative perspective of GAME THEORY. This methodology has two main steps: Modeling and Analysis. After removing infeasible combinations, 15 states which are possible to occur in reality, are studied in the modeling phase. Then, the ordinal preferences of the players over the states are represented. Various solution concepts are employed in this research for stability definition. Stability analysis shows that two states are predicted to be equilibria. The predicted outcomes indicate that MALWARE authors employ environment diagnostics and security analysts use system event monitoring along with global system state anomaly detection. Recent evidences are in conformity with the finding of this research.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ABBASI, MOSTAFA, SHEIKH MOHAMMADI, MAJID, & GHAYOORI SALES, MAJID. (2017). MODELING AND ANALYSIS OF COMPETITION BETWEEN MALWARE AUTHORS AND SECURITY ANALYSTS, USING GAME THEORY. STRATEGIC STUDIES OF PUBLIC POLICY (STRATEGIC STUDIES OF GLOBALIZATION JOURNAL), 7(23 ), 19-41. SID. https://sid.ir/paper/229976/en

    Vancouver: Copy

    ABBASI MOSTAFA, SHEIKH MOHAMMADI MAJID, GHAYOORI SALES MAJID. MODELING AND ANALYSIS OF COMPETITION BETWEEN MALWARE AUTHORS AND SECURITY ANALYSTS, USING GAME THEORY. STRATEGIC STUDIES OF PUBLIC POLICY (STRATEGIC STUDIES OF GLOBALIZATION JOURNAL)[Internet]. 2017;7(23 ):19-41. Available from: https://sid.ir/paper/229976/en

    IEEE: Copy

    MOSTAFA ABBASI, MAJID SHEIKH MOHAMMADI, and MAJID GHAYOORI SALES, “MODELING AND ANALYSIS OF COMPETITION BETWEEN MALWARE AUTHORS AND SECURITY ANALYSTS, USING GAME THEORY,” STRATEGIC STUDIES OF PUBLIC POLICY (STRATEGIC STUDIES OF GLOBALIZATION JOURNAL), vol. 7, no. 23 , pp. 19–41, 2017, [Online]. Available: https://sid.ir/paper/229976/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button