The Hacking Game: Cross
Download
Report
Transcript The Hacking Game: Cross
The Hacking Game:
Cross-Impact Analysis Tool
Art Hendela, PhD student, [email protected]
Introduction
The
Problem
Types of Games
The Hacking Game
Cross Impact Analysis
The Hacking Game Components
Technology Used
Future Work
The Problem
Protect
a computer network from attack
with limited resources
Determine the allocation of those
resources with the help of a
mathematical model
Types of Games
Economic
Games
Cooperative,
i.e., joint venture
(Aloysius,2002)
Non-Cooperative, business competitors
(Garcia, 2003)
Mixed (Nash, 1951)
Combinatorial
Two
Games
person with perfect knowledge
(Berlekamp 1982 )
The Hacking Game
Participation
in the game occurs in a
virtual space
No scenario is pre-determined
Input is limited to your allotted budget
Uses a mathematical model to aid
resource allocation
Model is based on Cross Impact
Analysis
Cross Impact Analysis
From
a paper by Murray Turoff in 1972
entitled, “An Alternative Approach to
Cross Impact Analysis”
Used for determining influences
between events
Uses the Delphi Method to help
generate group statistics for impact
(Turoff, 1970)
Cross Impact Analysis Inputs
A
set of base events
The probability of each base event occurring
independent of the other events, Pi
The set of probabilities for all other events
where an individual base event is certain to
occur, Rij
The set of probabilities for all other events
where an individual base event is certain to
never occur, Sij
Cross Impact Analysis Outputs
The
relative impact of one event on
another, Cij
The influence by external events not
entered, Gi
The Hacking Game Components
Security System
Component Library
Game
Definition
Players
Event Library
Cross Impact
Calculation Engine
Probabilities
Teams
Results
Survey
The Hacking Game Components
Security
and roles
Player/team management
Game Definition with Budgets
Components
Events
Probabilities
Calculation Engine
Results reporting
Survey/evaluation
Technology Used
Code
Framework: ASP.NET 2.0
Development Environment: Visual
Studio 2005
Language: Visual Basic, VB.NET
Database: MS SQLServer 2000
Future Work
Complete
development of the model
Field test and evaluate the game
Expand the use of the approach to nonnetwork hacking environments that feature
an offense/defense structure
Protect
chemical plants from terrorism
Launch a new product against a business
competitor
Acknowledgements
This
research is fully supported by
Hendela System Consultants, Inc, Little
Falls, NJ (www.hendela.com). The
opinions expressed are those of the
authors and may not reflect those of the
corporate sponsor.
Selected References
Aloysius,
J. A. (2002). "Research Joint
Ventures: A Cooperative Game for
Competitors." European Journal of
Operational Research 136(3): 591-602.
Berlekamp, E., Conway, J, and Guy, R.
(1982). Winning Ways for your
Mathematical Plays, Academic Press.
Selected References
Garcia, D. D., David Ganet, Peter
Henderson (2003). "Everything you
Always Wanted to Know about Game
Theory (But were Afraid to Ask)."
SIGCSE 2003 35(1): 96-97.
Nash, J. F. (1951). "Non-Cooperative
Games." Annals of Mathematics Journal
54(1951): 286-295.
Selected References
Turoff, M, (1970). “The Design of a Policy
Delphi”, Technology Forecasting and
Social Change, 2(2).
Turoff, M, (1972). “An alternative
approach to Cross Impact Analysis."
Technology Forecasting and Social
Change”, 3, 338-368.