Show simple item record

dc.contributor.authorMavronicolas, Mariosen
dc.contributor.authorMonien, Burkharden
dc.contributor.authorLesta, Vicky Papadopoulouen
dc.creatorMavronicolas, Mariosen
dc.creatorMonien, Burkharden
dc.creatorLesta, Vicky Papadopoulouen
dc.date.accessioned2019-11-13T10:41:14Z
dc.date.available2019-11-13T10:41:14Z
dc.date.issued2008
dc.identifier.isbn0-7695-3075-3
dc.identifier.isbn978-0-7695-3075-8
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/54511
dc.description.abstractIn a distributed system with attacks and defenses, an economic investment in defense mechanisms aims at increasing the degree of system protection against the attacks. We study such investments in the selfish setting, where both attackers and defenders are self-interested entities. In particular, we assume a reward-sharing scheme among interdependent defendersen
dc.description.abstracteach defender wishes to maximize its own fair share of the attackers caught due to him (and possibly due to the involvement of others). Addressed in this work is the fundamental question of determining the maximum amount of protection achievable by a number of such defenders against a number of attackers if the system is in a Nash equilibrium. As a measure of system protection, we adapt the Defense-Ratio [12], which describes the expected proportion of attackers caught by defenders. In a Defense-Optimal Nash equilibrium, the Defense-Ratio is optimized. We discover that the answer to this question depends in a quantitatively subtle way on the invested number of defenders. We identify graph-theoretic thresholds for the number of defenders that determine the possibility of optimizing a Defense-Ratio. In this vein, we obtain, through an extensive combinatorial analysis of Nash equilibria, a comprehensive collection of trade-off results. © 2008 IEEE.en
dc.sourceProceedings of the Annual Hawaii International Conference on System Sciencesen
dc.source41st Annual Hawaii International Conference on System Sciences 2008, HICSSen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-51449092032&doi=10.1109%2fHICSS.2008.193&partnerID=40&md5=5196f544ab515827bc3caa9070f17dd3
dc.subjectAlgebraen
dc.subjectInvestmentsen
dc.subjectNash equilibriumen
dc.subjectOptimizationen
dc.subjectComputer networksen
dc.subjectArsenic compoundsen
dc.subjectInternational conferencesen
dc.subjectElectric breakdownen
dc.subjectSystem protectionen
dc.subjectSystem sciencesen
dc.titleHow many attackers can selfish defenders catch?en
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.identifier.doi10.1109/HICSS.2008.193
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeConference Objecten
dc.description.notes<p>Conference code: 73224en
dc.description.notesCited By :1</p>en
dc.contributor.orcidLesta, Vicky Papadopoulou [0000-0003-2920-8473]
dc.gnosis.orcid0000-0003-2920-8473


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record