О НАХОЖДЕНИИ ВСЕХ НЕДОМИНИРУЕМЫХ МАКСИМИННЫХ СТРАТЕГИЙ ОДНОГО ИЗ ИГРОКОВ В БЕСКОАЛИЦИОННОЙ ИГРЕ ДВУХ ЛИЦ, МОДЕЛИРУЮЩЕЙ ПРОЦЕСС ЗАКУПКИ СРЕДСТВ ЗАЩИТЫ ДЛЯ КОМПЬЮТЕРНОЙ СИСТЕМЫ
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

ABOUT FINDING ALL NONDOMINATED MAXIMIN STRATEGIES OF ONE OF THE PLAYERS IN A TWO-PERSON NONCOOPERATIVE GAME THAT MODELS A PROCESS OF PURCHASING PROTECTION MEANS FOR A COMPUTER SYSTEM

Sushkin V.V. 

UDC 519.833
DOI: 10.26102/2310-6018/2019.26.3.036

  • Abstract
  • List of references
  • About authors

A two-person noncooperative game that models a process of purchasing protection means for a computer system is considered. One of the players in this game is a party responsible for the security of the system. Having a certain amount of money that can be spent on the purchase of the protection means this party determines which of these funds should be purchased. Actions of the other player (and it's the external world in relation to the computer system) are attacks on the computer system implemented via the network. For each of the protection means that can be purchased as well as for each of the types of attacks that can be used in an assault on the computer system a probability with which the attack will be reflected by the protection mean is known. By choosing the protection means a party responsible for the security seeks to minimize overall losses which include first a cost of the purchased protection means and secondly a damage expected from use of the other party attacks on the computer system. A study of an optimality principle implementations of which are nondominated maximin strategies of a player, which is a party responsible for ensuring the security of the system, is carried out. A result of this study is statements that determine a method of finding all nondominated maximin strategies of the specified player.

1. Vorob'ev N.N. Fundamentals of game theory. Noncooperative games. – M.: Science, 1984. – 496 p.

2. Guts A.K., Wahn T.V. Game theory and protection of computer systems. – Omsk: Publishing House of Omsk State University, 2013. – 160 p.

3. Moulin E. Game theory with examples from mathematical economics. – M.: Mir, 1985. – 200 p.

4. Vorob'ev N.N. Game theory for economists-cyberneticists. – M.: Science, 1985. – 272 p.

5. Sushkin V.V., Dozmorov E.D. About finding nondominated maximin strategies of one of the players in a two-person noncooperative game that models a process of purchasing protection means for a computer system. // Mathematical methods of control: Collection of proceedings. – Tver: Tver State University, 2019. – P. 23 – 31.

6. Sushkin V.V., Kurbatov D.V. About some properties of the domination relation given on the set of strategies of one of the players in a two-person noncooperative game that models a process of purchasing protection means for a computer system. // Mathematical methods of control: Collection of proceedings. – Tver: Tver State University, 2019. – P. 40 – 46.

7. Lagunov V.N. Introduction to differential games. – Vilnius: Institute of Mathematics and Cybernetics of Lithuanian SSR Academy of Sciences, 1979. – 342 p.

Sushkin Vyacheslav Vyacheslavovich
Candidate of Physical and Mathematical Sciences, Associate Professor
Email: vsushkin@mail.ru

Tver State University

Tver, Russian Federation

Keywords: noncooperative game, maximin strategy, nondominated strategy, computer system, attack on a computer system, protection of a computer system

For citation: Sushkin V.V. ABOUT FINDING ALL NONDOMINATED MAXIMIN STRATEGIES OF ONE OF THE PLAYERS IN A TWO-PERSON NONCOOPERATIVE GAME THAT MODELS A PROCESS OF PURCHASING PROTECTION MEANS FOR A COMPUTER SYSTEM. Modeling, Optimization and Information Technology. 2019;7(3). URL: https://moit.vivt.ru/wp-content/uploads/2019/09/Sushkin_3_19_1.pdf DOI: 10.26102/2310-6018/2019.26.3.036 (In Russ).

768

Full text in PDF

Published 30.09.2019