:::

詳目顯示

回上一頁
題名:多重代理人系統與外部威脅-賽局理論之應用
作者:吳正光
作者(外文):Cheng-Kuang Wu
校院名稱:國立中央大學
系所名稱:資訊管理研究所
指導教授:陳奕明
吳大任
學位類別:博士
出版日期:2009
主題關鍵詞:兩階段賽局模型夏普利值納許均衡外部威脅多重代理人系統Two-stage game modelShapley valueNash equilibriumOutside threatMulti-Agents system
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:55
入侵偵測系統(IDS)在網路主機上,安裝防護軟體偵測入侵者,並防止病毒加害主機;又如美國本土防恐防護系統(HSAS),建立「安全監控中心」(EOC)及「區分威脅等級」警示系統,提昇各地區緊急反應單位對恐怖攻擊的敏感度,以及強化資源的配置效率來提昇安全應變能力。這兩個系統必須在廣闊的保護區域中設置多個節點,無法全面性的考量到有多個可能會受到攻擊的目標,我們用多重代理人系統(MAS)概念來佈建防禦系統,由於這些由多個互動代理人所組成的系統會遭受到外來的威脅,因此本研究應用賽局理論來設計系統,以應付大量的攻擊與破壞。綜觀現行的相關研究,如果考量防護代理人數量過多時,會遭遇可擴充性的問題。本研究提出一個整合的賽局模型去改善這問題,並建置一個優先配置多重代理人的系統來防護整體系統的安全。
本論文結合非合作賽局與合作賽局模型,提出一個兩階段的整合模型。第一階段用非合作賽局去塑模與分析外來攻擊者與防守代理人之間的互動行為,然後從納許均衡解計算出單一代理人遭受攻擊時的威脅值。第二階段用合作賽局去塑模多重代理人間資源分享的互動行為,考量在不同的安全警戒程度下,用代理人的威脅值計算夏普利值,因此可以基於各個代理人的平均邊際貢獻下得到一個可行的防守代理人配置集合。提出的模型應用在三個案例,數值模擬的結果呈現兩個意涵:第一,模型可以量化各防護代理人的受威脅值,可以預測那些防護代理人是較容易遭受攻擊?那些是較堅固?可提供系統管理者做決策。第二,如果將整體安全情況區分為若干等級,本研究發現:在警戒程度較低時,管理者可以把系統內所有的資源均分給多數的防護代理人,達到「防微杜漸」的功能;而在警戒程度較高時,把所有的資源給少數的重要代理人,達到「抓大放小」的取捨。在有限的資源下,可以有效的分配整體多代理人系統的資源。緊急事件管理者應用本架構可以量化評估那個代理人是較危險?以增加系統處理外來威脅的反應能力。
In intrusion detection systems (IDSs), a software sensor is installed in a host of network to identify intrusions and viruses in order to prevent from entering the host by analyzing system calls. Homeland security advisory system (HSAS) is developed by the U.S. government to set up alarm system of emergency operations centers (EOC) and decide when to raise the threat level of system. The HSAS facilitates the sensitivity of protection of various regional emergency agencies, as well as strengthens resource reallocation and deployment efficiency so as to improve the response agency’s capability against terrorist attacks. Because IDS and HSAS need to deploy a large scale of response nodes at overall region, these systems cannot fulfill the requirement of resources allocation while all targeted nodes are attacked by outside attackers, especially when the available resources are constrained. Thus, the concept of multi-agent system (MAS) is applied to construct these systems. These MASs are designed to deploy multiple response agents when face outside threat. The related works encounter scalability problem that MASs handle growing amounts of agent work in a graceful manner or a large number of agents. Therefore, an integrated model of noncooperative game and cooperative game is proposed to improve this problem and prioritize to allocate the resources of MAS so as to implement overall system security.
This dissertation proposes a two-stage model to connect the noncooperative game model with cooperative game model. In the first stage, the interactive behaviors between the outside attacker and the district response agent are modeled and analyzed as a noncooperative game, after which the outside threat value is derived from the Nash equilibrium. In the second stage, the interactive behaviors among agents are modeled as a cooperative game, and the threat value is utilized to compute the Shapley value of all response agents for several different threat levels. Then an acceptable resources allocation of response agents based on the expected marginal contribution creates a minimum set of resource deployment costs. The two-stage model is applied to three MAS cases, and the experimental results discussed. Two implications are suggested. First, based on the interactions between agent and attacker, the proposed model provides administrator decision-making that can predict which agent is more vulnerable to attack, and which agent is more robust against outside attacks. Second, the overall security situation of protective region is divided into a number of alert levels. The experimental results show that at a low level, the MAS advises emergency managers to redistribute the response resources to many agents in order to "nip attacks in the bud". When the alert level is raised to its highest level, emergency managers redistribute all resources to a small number of critical agents in order to "achieve the goal of resisting serious attacks and discarding less effective agent". Thus, the two-stage model enables to allocate resources efficiently in the overall system given resource constraints. In addition, this framework can be used to increase the emergency manager’s ability to immediately respond to outside multiple attacks.
[1]Abhyankar, A.R., S.A. Soman, and S.A. Khaparde (2006). “Optimization Approach to Real Power Tracing: an Application to Transmission Fixed Cost Allocation,” IEEE Transactions on Power Systems, Vol.21, Issue 3, pp.1350 – 1361.
[2]Alpcan, T. and T. Basar (2003). “A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection,” IEEE Conference on Decision and Control, pp. 2595–2600.
[3]Anthony, P. and N. R. Jennings (2003). “Developing a Bidding Agent for Multiple Heterogeneous Auctions,” ACM Transaction on Internet Technology. Vol.3, pp.185–217.
[4]Avin, C. and C. Brito (2004). “Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques,” Proceedings Third International Information Processing in Sensor Networks, pp.277–286.
[5]Basar, T. and G. J. Olsder (1999). Dynamic Noncooperative Game Theory, Philadelphia, Academic Press.
[6]Berkovitz, L. D. and M. Dresher (1959). “A Game-Theory Analysis of Tactical Air War,” Operations Research, Vol.7, pp.599–620.
[7]Bier, V. M., A. Louis, Jr. Cox, and M. Azaiez Naceur (2006). “Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks, ” Statistical Methods in Counterterrorism, Chapter 1, pp.23–40.
[8]Bier, V. M., S. Oliveros, and L. Samuelson (2007). “Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker,” Journal of Public Economic Theory, Vol.9, pp.563–587.
[9]Burke, D. A. (1999). “Towards a Game Theoretic Model of Information Warfare,” Master’s Thesis, Air Force Institute of Technology, Air University.
[10]Cai, J. and U. Pooch (2004). “Allocate Fair Payoff for Cooperation in Wireless Ad Hoc Networks Using Shapley Value,” Proceedings of the 18th International Parallel and Distributed Processing Sym, pp.219–227.
[11]Cavusoglu, H., B. Mishra, and S. Raghunathan (2005). “The Value of Intrusion Detection Systems in Information Technology Security Architecture,” Information Systems Research, Vol.16, pp.28–46.
[12]Chen, Y-M, D. Wu, and C-K. Wu (2008). “A Game Theory Approach for an Emergency Management Security Advisory System,” IEEE International Conference on Intelligence and Security Informatics, pp.116–121.
[13]Conejo, A. J., J. Contreras, D. A. Lima, and A. Padilha-Feltrin (2007). “Zbus Transmission Network Cost Allocation,” IEEE Transactions on Power Systems, Vol.22, Issue 1, pp.342 – 349.
[14]Dighe, Nikhil S., J. Z. and V. M. Bier (2009). “Secrecy in Defensive Allocations as a Strategy for Achieving more Cost-effective Attacker Deterrence,” International Journal of Performability Engineering, Vol.5, No.1, pp.31–43.
[15]Dixit, A. and S. Skeath (2001). Games of Strategy. W. W. Norton & Company.
[16]Faratin, P., M. Klein, H. Sayama, and Y. Bar-Yam (2001). “Simple Negotiating Agents in Complex Games: Emergent Equilibria and Dominance of Strategies,” Proceedings Eighth Int’l Workshop Agent Theories, Architectures, and Languages, pp.42–53.
[17]Ferber, Jacques (1998). Multi-Agent Systems-An Introduction to Distributed Artificial Intelligence. Addision–Wesley, p.9.
[18]Fiedrich, F., F. Gehbauer, and U. Rickers (2000). “Optimized Resource Allocation for Emergency Response after Earthquake Disasters,” Safety Science, Vol.35, pp.41–57.
[19]Fricker, Ronald D. (2006). Game Theory in an Age of Terrorism: How Can Statisticians Contribute? Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, Chapter 1, Springer.
[20]Friedman, J.W. (1986). Game Theory with Applications to Economics. Oxford University Press.
[21]Genesereth, M. R., M. Ginsberg, and J. S. Rosenschein (1986). “Cooperation without Communication,” The Fifth National Conference of Artificial Intelligence, pp.52–57.
[22]Gibbon, R. (1992). A Primer in Game Theory. Harvester Wheatsheaf.
[23]Goemans, M. X. and M. Skutella (2004). “Cooperative facility location games, “Journal of Algorithms, Vol.50, pp.194–214.
[24]Gupta, U. and N. Ranganathan (2006). “Social Fairness in Multi-Emergency Resource Management,” Proceedings IEEE Int’l Symp.Technology and Soc, pp.1–9.
[25]Gupta U. and N. Ranganathan (2007). “Multievent Crisis Management Using Noncooperative Multistep Games,” IEEE Transactions on Computers, Vol.56, pp.577–589.
[26]Hafez, M. Mohammed. (2006). “Rationality, Culture, and Structure in the Making of Suicide Bombers: A Preliminary Theoretical Synthesis and Illustrative Case Study,” Studies in Conflict and Terrorism, Vol.29, Issue 2, pp.165 – 185.
[27]Hansen, T. (1974). “On the Approximation of Nash Equilibrium Points in an N-Person Non-Cooperative Game,” SIAM J. Applied Math, Vol.26, No.3, pp.622–637.
[28]Jacobson, D. and H. E. Kaplan (2007). “Suicide Bombings and Targeted Killings in (Counter-) Terror Games,” The Journal of Conflict Resolution, Vol.51, Issue 5, pp.772–792.
[29]Keromytis, A. D., M. Vishal, and D. Rubenstein (2004). “SOS: An Architecture for Mitigating DDoS Attacks,” IEEE Communications, Vol.22, pp.176–188.
[30]Kirkpatrick, S. (1984). “Optimization by Simulated Annealing—Quantitative Studies,” Statistical Physics, Vol.34, pp.975–986.
[31]Kodialam, M. T. and Lakshman, V. (2003). “Detecting Network Intrusions via Sampling: A Game Theoretic Approach,” IEEE INFOCOM Conferences, Vol.3, pp.1880–1889.
[32]Kraus, S. (1997). “Negotiation and Cooperation in Multi-agent Environments,” Artificial Intelligence, Vol.94, pp.79–98.
[33]Kraus, S. (2001). Strategic Negotiation in Multiagent Environments, MIT Press, Cambridge, Massachusetts. p.5.
[34]Lemke, C. E. and J. T. Howson (1964). “Equilibrium Points of Bimatrix Games,” SIAM J. Applied Math., Vol.12, pp.413–423.
[35]Lewis, H. W. (1997). Why Flip a Coin? : The Art and Science of Good Decisions. John Wiley and Sons.
[36]Liu, P. and L. Li (2002). “A Game Theoretic Approach to Attack Prediction,” Technical Report, Penn State University
[37]Liu, P. and W. Zang (2005). “Incentive-based Modeling and Inference of Attacker Intent, Objectives, and Strategies,” ACM Transactions on Information and System Security, Vol.8, pp.78–118.
[38]Lo, V. M. (1988). “Heuristic Algorithms for Task Assignment in Distributed Systems,” IEEE Transactions on Computers, Vol.37, pp.1384–1397.
[39]Lye, K. W. and J. Wing (2005). “Game Strategies in Network Security,” International Journal of Information Security, Vol.4, pp.71–86.
[40]Mark, Harrison, (2006). “Bombers and Bystanders in Suicide Attacks in Israel 2000 to 2003,” Studies in Conflict and Terrorism, Vol.29, Issue 2, pp.187 – 206.
[41]McKelvey, R. and A. McLennan (1996). “Computation of Equilibria in Finite Games,” Handbook of Computational Economics, pp.87–142.
[42]McKelvey, R. D., M. Andrew, and T. L. Turocy (2007). Gambit: Software Tools for Game Theory, http://econweb.tamu.edu/gambit.
[43]Mell, P., D. Marks, and M. McLarnon (2000). “A Denial-of-Service resistant intrusion detection architecture,” Computer Network, Vol.34, pp.641–658.
[44]Melvin, D. (1981). The Mathematics of Game of Strategy Theory and Application. Dover Publication, Inc., New York.
[45]Mishra, D. and B. Rangarajan (2005). “Cost Sharing in a Job Scheduling Problem Using the Shapley Value,” Proceedings of the 6th ACM conference on Electronic commerce, pp.232–239.
[46]Nara, K. and Y. Hayashi (1999). “A Solution Algorithm Based on Multi-Stage Tabu Search for Nested Combinatorial Optimization Problem Dispersed Energy Storage and Generators,” Proceedings of IEEE Int’l Conference, Systems, Man, and Cybernetics, Vol.3, pp.551–556.
[47]Nash, J. (1951). “Non-Cooperative Games,” Annals Math. second series, Vol.54, pp.286–295.
[48]Nathan, S., M. Janusz, T. Milind, and S. Paul (2005). “The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO,” Multi-Agent Programming. pp.197–215.
[49]Osborne, M. J. and A. Rubinstein (1994). A Course in Game Theory. MIT Press.
[50]Owen, G. (2001). Game Theory. 3rd Ed. New York, NY: Academic Press.
[51]Papadimitriou, C. H. (1994). Computational Complexity. Addison-Wesley: Reading, MA.
[52]Parsons, S. and M. Wooldridge (2002). “Game Theory and Decision Theory in Multi-Agent Systems,” Autonomous Agents and Multi-Agent Systems, Vol.5, pp.243–254.
[53]Paruchuri, P., M. Tambe, F. Ord´o˜nez, and S. Kraus (2005). “Safety in Multiagent Systems by Policy Randomization,” The 2nd International Workshop on Safety and Security in Multiagent Systems (SASEMAS). pp.273–280.
[54]Paruchuri, P., J. P. Pearce, M. Tambe, F. Ord´o˜nez, and S. Kraus (2007). “An Efficient Heuristic Approach for Security against Multiple Adversaries,” The 6th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-2007). pp.181–190.
[55]Paruchuri, P., J. P. Pearce, J. Marecki, M. Tambe, F. Ord´o˜nez, and S. Kraus (2008). “Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games,” The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-2008), pp.895–902.
[56]Pelfrey, V. William. (2005). “The Cycle of Preparedness: Establishing a Framework to Prepare for Terrorist Threats,” Journal of Homeland Security and Emergency Management, Vol.2, Issue 1, article 5.
[57]Perry, R.W. (2003). “Emergency Operations Centers in an Era of Terrorism: Policy and Management Functions,” Journal of Contingencies and Crisis Management, Vol.11, No.4, pp.151–159.
[58]Ranganathan, N., U. Gupta, R. Shetty and A. Murugavel (2007). “An Automated Decision Support System Based on Game Theoretic Optimization for Emergency Management in Urban Environments,” Journal of Homeland Security and Emergency Management, Vol.4, Issue 2, article 1.
[59]Rasmusen, E. (2007). Games and Information: an Introduction to Game Theory, Fourth Edition, Blackwell Publishing.
[60]Rawling, G. (1991). Foundations of Genetic Algorithms. Morgan Kaufmann.
[61]Raymond, T. (2008). Mumbai Terrorists Aided by Security Lapses, Technology” VOA News, Tuesday, 02 December 2008, http://www.voanews.com/english/ archive/2008-12/ 2008-12-02-voa33.cfm.
[62]Reddick, C. G. (2007). “Homeland Security Preparedness and Planning in US City Governments: A Survey of City Managers,” Journal of Contingencies and Crisis Management, Vol.15, pp.157–167.
[63]Risk Analysis and Management for Critical Asset Protection (RAMCAPSM) http://www.asme-iti.org/RAMCAP/RAMCAP_Plus_2.cfm
[64]Rosenschein, J. S. and M. R. Genesereth (1985). “Deals among Rational Agents,” The Ninth International Joint Conference on Artificial Intelligence (IJCAI-85), Los Angeles, CA, pp.91–99.
[65]Rosenschein, J. S. and G. Zlotkin (1994). Rules of Encounter: Designing Conventions for Automated Negotiation among Computers, The MIT Press: Cambridge, MA.
[66]Schafer, W. A., J. M. Carroll, S. R. Haynes, and S. Abrams (2008). “Emergency Management Planning as Collaborative Community Work,“ Journal of Homeland Security and Emergency Management, Vol.5, Issue 1, Article 10.
[67]Schechter, S. E. (2004). Computer Security Strength and Risk: a Quantitative Approach, PhD Thesis, Harvard University.
[68]Schechter, S. E. (2005). “Toward Econometric Models of the Security Risk from Remote Attacks,” IEEE Security and Privacy, Vol.3, pp.40–44.
[69]Schelling, T. C. (1980). The Strategy of Conflict, Harvard University Press.
[70]Shaw, D. S., J. M. Post, and K. G. Ruby (1999). “Inside the Minds of the Insider,” Security Management, Vol.43, pp.34–44.
[71]Sherif, M.R., I.W. Habib, M. Nagshineh, and P. Kermani (2000). “Adaptive Allocation of Resources and Call Admission Control for Wireless ATM Using Genetic Algorithms,” IEEE J. Selected Areas in Comm., Vol.18, pp.268–282.
[72]Shi, Jin, Y. Lu, and L. Xie (2007). “Game Theory Based Optimization of Security Configuration,” 2007 International Conference on Computational Intelligence and Security, pp.799–803.
[73]Stuckman, G. Evans and M. Mollaghasemi (1991). “Comparison of Global Search Methods for Design Optimization Using Simulation,” Proceedings of the 1991 Winter Simulation Conference, pp.937–944.
[74]Subrahmanian V. S., P. Bonatti, J. Dix, T. Eiter, S. Kraus, F. Ozcan, and R. Ross (2000). Heterogeneous Agent Systems: Theory and Implementation. MIT Press, Cambridge, Massachusetts.
[75]Sullivan, K. A. and S. H. Jacobson (2001). “A Convergence Analysis of Generalized Hill Climbing Algorithms,” IEEE Trans. Automatic Control, Vol.46, No.8, pp.1288–1293.
[76]Sun, R. and I. Naveh (2004). “Simulating Organizational Decision-Making Using a Cognitively Realistic Agent Model,” Journal of Artificial Societies and Social Simulation, Vol.7, p.1–12.
[77]Sun, W., X.W. Kong, Dequan H., and Xingang Y. (2008). “Information Security Problem Research Based on Game Theory,” International Symposium on Electronic Commerce and Security, pp.554–557.
[78]Tessier, C., L. M. Chaudron, and J. Heinz (2001). Conflicting Agents–Conflict Management in Multi-Agent Systems, Kluwer Academic Publishers, USA.
[79]Turoff, M., M. Chumer, V. B. Walle, and X. Yao (2004). “The Design of a Dynamic Emergency Response Management Information System (DERMIS),” Journal of Information Technology Theory and Application, Vol.5, pp.1–35.
[80]Vetta, A. (2002). “Nash Equilibria in Competitive Societies, with Applications to Facility Location, Traffic Routing and Auctions,” Proceedings 43rd Annual IEEE Foundations of Computer Science, pp.416–425.
[81]Vidal, J. M. (2007). Fundamentals of Multiagent Systems with NetLogo Examples, Textbook, accessed from http://jmvidal.cse.sc.edu/papers/mas-20070824.pdf.
[82]Von, N. J. and O. Morgenstern (1944). Theory of Games and Economic Behaviour. Princeton University Press.
[83]Weiss, G. (1999). Multiagent Systems – A Modern Approach to Distribution Artificial Intelligence, MIT Press.
[84]Wenzlaff, K. (2004). Terrorism: Game Theory and Other Explanations, Working Paper, Philosophy and Economics at University of Bayreuth, accessed from http://www.karsten-wenzlaff.de/wp-content/uploads/2006/10/wenzlaff-game-theory-and-terrorism.pdf.
[85]Wooldridge, M. (2002). An Introduction to MultiAgent Systems, John Wiley & Sons Ltd, pp.366.
[86]Xia, Z-Y and S. Zhang (2003). “A Kind of Network Security Behavior Model Based on Game Theory,” 2003 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.950–954.
[87]Zdansky, M. and J. Pozivil (2002). “Combination Genetic/Tabu Search Algorithm for Hybrid Flowshops Optimization,” Proceedings of Conference Scientific Computing Algorithms, pp.230–236.
[88]Zhuang, J. and V. M. Bier (2007). “Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort,” Operations Research, Vol.55, No.5, pp.976–991.
[89]Zhuang, J. and V. M. Bier (2009). Secrecy and Deception at Equilibrium with Applications to Anti-Terrorism Resource Allocation, Economics and Politics, Forthcoming.
[90]Zolezzi, J. M. and H. Rudnick (2002). “Transmission Cost Allocation by Cooperative Games and Coalition Formation,” IEEE Transactions on power systems, Vol.41, pp.1008–1015.
[91]Zou, C. C., W. Gong, and D. Towsley (2002). “Code Red Worm Propagation Modeling and Analysis,” Proceedings of the 9th ACM Symp, pp.138–147.
[92]Symantec Corporation, http://www.symantec.com/index.jsp.
[93]http://www.dhs.gov/index.shtm.
[94]http://www.dtic.mil/doctrine/jel/doddict/data/d/01737.html.
[95]http://www.dtic.mil/doctrine/jel/doddict/natoterm/d/00423.html.
[96]http://create.usc.edu/research/risk_assessment.html.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top