Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, August 22, 2011

Game Theory Improves Detection of Security Breaches

Posted on 5:38 AM by Unknown

Rebecca Kutzer-Rice

Network attackers are becoming more adept at breaching even the most advanced firewalls. Now, using models from game theory an information technologist has created an anti-hacking tool that is more effective than traditional approaches. An added bonus: Unlike other methods, the new tool identifies attacks in real time.With several major IT security concerns in recent months, many companies are seeking protection beyond traditional methods like firewalls and log analysis. At Iona College in New Rochelle, N.Y., a researcher has applied game theory to models of security breaches to create a better defense mechanism for networks. Already, the approach has proven more effective than traditional technologies.
Information technologist Heechang Shin recently published his results in the "International Journal of Business Continuity and Risk Management." According to Shin, the vast growth in the types and numbers of devices—including smartphones, iPods and tablet PCs—connected to networks has created vulnerability across information systems. These devices are a major cause of the uptick in network attacks.
Security breaches can lead to significant service disruptions for users, and they can also cost as much as 1 percent of annual sales per incident, Shin says. “That number amounts to tens of millions of dollars for the average publicly listed company,” Shin said in a statement.
Using the game-theory model of defensive forecasting, Shin has created an anti-hacking tool that identifies security breaches in real time. The tool compares network reality to a forecasted breach and alerts network operators when the two match up.
While traditional security methods—such as log analysis—detect breaches after they have occurred, Shin’s tool monitors real-time data to identify problems immediately. This allows for a quick response to breaches, thereby reducing the damage to service and profits that attackers can cause.
The tool is able to identify a wide variety of attack types, including denial of service attacks, attacks by insiders and probing attacks.
A standard classification method for network attack identification, according to Shin, is the data set based on a support vector machine and created from the dump data of the simulation of an average U.S. Air Force LAN to a network intrusion system.
When compared to the SVM-based tool, Shin’s game-theory tool is just as effective, but works in real time.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • When touring the Large Hadron Collider, stay with your group
  • Hooray, the supercommittee failed! Commentary: Failure no help, but greater harm averted
    By Darrell Delamaide  — The supercommittee to cut the deficit was a bad idea, and its failure is a good thing for America. Pundits are...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • Wet Electronics Open Door to New Possibilities
    R. Colin Johnson Gadgets, gizmos and wireless wonders must be fastidiously protected from moisture today, but researchers using circuitry w...
  • 2012 Salary and Skills report
    http://www.techrepublic.com/blog/career/infographic-2012-salary-and-skills-report/4545?tag=nl.e101
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • Entry-level IT jobs will be plentiful in 2012, experts predict
    Help desk, app development, analytics among the hottest prospects for college grads By Carolyn Duffy Marsan Here is good news for coll...
  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • (no title)
    Toy Dept.: Parrot AR.Drone 2.0 Visits WWJ Reporting Matt Roush SOUTHFIELD — It’s hard to believe that a four-bladed toy helicopter with onb...
  • Melissa Harris-Perry: World wide web access to local communities
    Melissa Harris-Perry: World wide web access to local communities : 'via Blog this' Visit NBCNews.com for breaking news , world news ...

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ►  November (27)
    • ►  October (18)
    • ►  September (11)
    • ▼  August (24)
      • Irene's wrath leaves 6,500 cell towers out, FCC says
      • How Social Media Improves Disaster Response
      • Hundreds of U.S. Data Centers Closing
      • Focus: HOPE career training programs!
      • Evolution Has Ossified the Internet
      • Pieces of Gold in Those Job Postings
      • How to Create a Job for Yourself
      • Motivational Moment
      • Motivational Moment
      • IBM Debuts Brainlike Cognitive Computer
      • Game Theory Improves Detection of Security Breaches
      • Texting, grand theft auto style; alarms pose risk
      • Gator power: Alligator fat pitched as biodiesel
      • Webcam System Reduces Workplace Back Problems
      • Motivational Moment
      • Anonymous breaches San Francisco's public transpor...
      • Motivational Moment
      • Motivational Moment
      • Why Tablets Don't Kill the Laptop
      • Motivational Moment
      • Why Wi-Fi as we know it is in trouble
      • Wet Electronics Open Door to New Possibilities
      • Social Media Fuels New Web-Based Political Party
      • The BDPA Insider - July 31, 2011
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile