Cyber security via signaling games: Toward a science of cyber security

William Casey, Jose A. Morales, Thomson Nguyen, Jonathan Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, Bhubaneswar Mishra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker quickly escalated to a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The record breaking Spamhaus/Cyberbunker conflict arose 13 years after the publication of best practices on preventing DDoS attacks, and it was not an isolated event. Recently, NYU's Courant Institute and Carnegie Mellon Software Engineering Institute have collaboratively devised a game-theoretic approaches to address various cyber security problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.

Original languageEnglish (US)
Title of host publicationDistributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings
PublisherSpringer Verlag
Pages34-42
Number of pages9
Volume8337 LNCS
ISBN (Print)9783319044828
DOIs
StatePublished - 2014
Event10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014 - Bhubaneswar, India
Duration: Feb 6 2014Feb 9 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8337 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014
CountryIndia
CityBhubaneswar
Period2/6/142/9/14

Fingerprint

Attack
Denial of Service
Game
Internet
Software engineering
Servers
Internet Traffic
Globe
Best Practice
Resilience
Use Case
Incentives
Measurement System
Complex Structure
Software Engineering
Minor
Server
Denial-of-service attack

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Casey, W., Morales, J. A., Nguyen, T., Spring, J., Weaver, R., Wright, E., ... Mishra, B. (2014). Cyber security via signaling games: Toward a science of cyber security. In Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings (Vol. 8337 LNCS, pp. 34-42). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8337 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-04483-5_4

Cyber security via signaling games : Toward a science of cyber security. / Casey, William; Morales, Jose A.; Nguyen, Thomson; Spring, Jonathan; Weaver, Rhiannon; Wright, Evan; Metcalf, Leigh; Mishra, Bhubaneswar.

Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings. Vol. 8337 LNCS Springer Verlag, 2014. p. 34-42 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Casey, W, Morales, JA, Nguyen, T, Spring, J, Weaver, R, Wright, E, Metcalf, L & Mishra, B 2014, Cyber security via signaling games: Toward a science of cyber security. in Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings. vol. 8337 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8337 LNCS, Springer Verlag, pp. 34-42, 10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014, Bhubaneswar, India, 2/6/14. https://doi.org/10.1007/978-3-319-04483-5_4
Casey W, Morales JA, Nguyen T, Spring J, Weaver R, Wright E et al. Cyber security via signaling games: Toward a science of cyber security. In Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings. Vol. 8337 LNCS. Springer Verlag. 2014. p. 34-42. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-04483-5_4
Casey, William ; Morales, Jose A. ; Nguyen, Thomson ; Spring, Jonathan ; Weaver, Rhiannon ; Wright, Evan ; Metcalf, Leigh ; Mishra, Bhubaneswar. / Cyber security via signaling games : Toward a science of cyber security. Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings. Vol. 8337 LNCS Springer Verlag, 2014. pp. 34-42 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{32c882df4fd14531af5942cbb61327c0,
title = "Cyber security via signaling games: Toward a science of cyber security",
abstract = "In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker quickly escalated to a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The record breaking Spamhaus/Cyberbunker conflict arose 13 years after the publication of best practices on preventing DDoS attacks, and it was not an isolated event. Recently, NYU's Courant Institute and Carnegie Mellon Software Engineering Institute have collaboratively devised a game-theoretic approaches to address various cyber security problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.",
author = "William Casey and Morales, {Jose A.} and Thomson Nguyen and Jonathan Spring and Rhiannon Weaver and Evan Wright and Leigh Metcalf and Bhubaneswar Mishra",
year = "2014",
doi = "10.1007/978-3-319-04483-5_4",
language = "English (US)",
isbn = "9783319044828",
volume = "8337 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "34--42",
booktitle = "Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings",

}

TY - GEN

T1 - Cyber security via signaling games

T2 - Toward a science of cyber security

AU - Casey, William

AU - Morales, Jose A.

AU - Nguyen, Thomson

AU - Spring, Jonathan

AU - Weaver, Rhiannon

AU - Wright, Evan

AU - Metcalf, Leigh

AU - Mishra, Bhubaneswar

PY - 2014

Y1 - 2014

N2 - In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker quickly escalated to a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The record breaking Spamhaus/Cyberbunker conflict arose 13 years after the publication of best practices on preventing DDoS attacks, and it was not an isolated event. Recently, NYU's Courant Institute and Carnegie Mellon Software Engineering Institute have collaboratively devised a game-theoretic approaches to address various cyber security problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.

AB - In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker quickly escalated to a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The record breaking Spamhaus/Cyberbunker conflict arose 13 years after the publication of best practices on preventing DDoS attacks, and it was not an isolated event. Recently, NYU's Courant Institute and Carnegie Mellon Software Engineering Institute have collaboratively devised a game-theoretic approaches to address various cyber security problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.

UR - http://www.scopus.com/inward/record.url?scp=84958523035&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84958523035&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-04483-5_4

DO - 10.1007/978-3-319-04483-5_4

M3 - Conference contribution

SN - 9783319044828

VL - 8337 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 34

EP - 42

BT - Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings

PB - Springer Verlag

ER -