MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Graduate Theses
  • View Item
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Graduate Theses
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Extending the analysis of the FlipIt game

Author(s)
Rossides, Michalis
Thumbnail
DownloadFull printable version (6.707Mb)
Alternative title
Game theory in computer science : extending the FlipIt game
Other Contributors
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.
Advisor
Ronald L. Rivest.
Terms of use
M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582
Metadata
Show full item record
Abstract
In this thesis, we extend the game theoretical analysis of the FlipIt game¹. The game was first articulated and analyzed by Marten van Dijk, Ari Juels, Alina Oprea and Ronald L. Rivest. FlipIt (or otherwise The Game of "Stealthy Takeover") is a game-theoretic framework for modeling computer security scenarios. Such scenarios include targeted attacks, cryptographic key rotation, password changing policies and cloud auditing. What we are particularly interested in are situations in which an attacker repeatedly takes control over a system or critical resource completely, learns all its secret information and this is not immediately detected by the system owner. As mentioned in the original paper', FlipIt is a two-player game between an attacker and a defender, in which both players try to control a shared resource. The players do not know who is currently in charge of the resource until they move; this is why it is called "Stealthy Takeover." Moreover, each player pays a specific cost every time he moves. The objective of each player is to maximize his benefit; this involves controlling the resource for as large fraction of time as possible and, at the same time, minimizing the total move cost. Here, we are only considering scenarios in which the defender plays with a renewal strategy; in particular, the intervals between his consecutive moves are given by a fixed probability distribution. However, the attacker can be more sophisticated than that and deploy adaptive strategies; i.e. he moves based on feedback received during the game. The main strategy we are considering for the defender is the biperiodic as stated in Section 4. For the attacker, we are considering various non-adaptive and adaptive strategies. Finally, we compare it to the relevant strategies already analyzed in the original FlipIt paper¹.
Description
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2013.
 
Cataloged from PDF version of thesis.
 
Includes bibliographical references (pages 59-60).
 
Date issued
2013
URI
http://hdl.handle.net/1721.1/85491
Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Publisher
Massachusetts Institute of Technology
Keywords
Electrical Engineering and Computer Science.

Collections
  • Graduate Theses

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.