TY - GEN
T1 - A Game Theory Based Reputation System for Security
AU - Ghimire, Bimal
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/2
Y1 - 2019/2
N2 - Security mechanisms play very crucial role while using the system. It is very important to secure the system from external as well as internal threats. External threats affect the system from outside and only when the system is connected to internet. Internal threats affect from inside the organization. In case of internal threats it is very hard to know who the actual threats are. It is easy for a system to secure it from external threats in comparison to internal threats. When it comes to secure the system from internal threats, it's really tough to define security policies because here the actual threats to system are unknown. Any crisp policies define for this purpose also affects the legitimate users. In this kind of scenario a flexible security mechanism simulating the real world's policy of reputation and trust is required. So in this paper a two layered architecture, one using traditional security model and other using game theoretical security model for system security is discussed.
AB - Security mechanisms play very crucial role while using the system. It is very important to secure the system from external as well as internal threats. External threats affect the system from outside and only when the system is connected to internet. Internal threats affect from inside the organization. In case of internal threats it is very hard to know who the actual threats are. It is easy for a system to secure it from external threats in comparison to internal threats. When it comes to secure the system from internal threats, it's really tough to define security policies because here the actual threats to system are unknown. Any crisp policies define for this purpose also affects the legitimate users. In this kind of scenario a flexible security mechanism simulating the real world's policy of reputation and trust is required. So in this paper a two layered architecture, one using traditional security model and other using game theoretical security model for system security is discussed.
UR - http://www.scopus.com/inward/record.url?scp=85074373118&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85074373118&partnerID=8YFLogxK
U2 - 10.1109/ICECCT.2019.8869002
DO - 10.1109/ICECCT.2019.8869002
M3 - Conference contribution
AN - SCOPUS:85074373118
T3 - Proceedings of 2019 3rd IEEE International Conference on Electrical, Computer and Communication Technologies, ICECCT 2019
BT - Proceedings of 2019 3rd IEEE International Conference on Electrical, Computer and Communication Technologies, ICECCT 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd IEEE International Conference on Electrical, Computer and Communication Technologies: Computer Science and Engineering, ICECCT 2019
Y2 - 20 February 2019 through 22 February 2019
ER -