О нахождении лексикографически максиминных стратегий одного из игроков в бескоалиционной игре двух лиц, моделирующей процесс закупки средств защиты для компьютерной системы
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

About finding lexicographically maximin strategies of one of the players in a two-person noncooperative game that models a process of purchasing protection means for a computer system

Sushkin V.V.  

UDC 519.833
DOI: 10.26102/2310-6018/2021.34.3.018

  • Abstract
  • List of references
  • About authors

A two-person noncooperative game that models a process of purchasing protection means for a computer system is considered. One of the players in this game is a party responsible for the security of the system. Having a certain amount of money that can be spent on the purchase of the protection means this party determines which of these funds should be purchased. Actions of the other player (and it's the external world in relation to the computer system) are attacks on the computer system implemented via the network. For each of the protection means that can be purchased as well as for each of the types of attacks that can be used in an assault on the computer system a probability with which the attack will be reflected by the protection mean is known. By choosing the protection means a party responsible for the security seeks to minimize overall losses which include first a cost of the purchased protection means and secondly a damage expected from use of the other party attacks on the computer system. A study of an optimality principle implementations of which are lexicographically maximin strategies of a player which is a party responsible for ensuring the security of the system is carried out. A result of this study is statements that determine a method of finding all lexicographically maximin strategies of the specified player.

1. Guts A.K., Vakhnii T.V. Teoriya igr i zashchita komp'yuternykh sistem. Omsk: Izd-vo OmGU. 2013. (In Russ)

2. Vakhnii T.V., Guts A.K., Konstantinov V.V. Program application for the choice of the optimum set means of protection of computer information on the basis of the games theory. Herald of Omsk University. 2013;4(70):201-206. (In Russ)

3. Vakhnii T.V., Guts A.K., Kuz'min S.Yu. Optimal selection of the antivirus program and the firewall by means of the game theory. Mathematical Structures and Modeling. 2014;4(32):240-246. (In Russ)

4. Vakhnii T.V., Guts A.K., Bondar' S.S. The accounting of probabilities of hacker attacks in game approach to selection of defence software for computer information. Mathematical Structures and Modeling. 2015;3(35):91-105. (In Russ)

5. Vakhnii T.V., Guts A.K., Novikov N.Yu. Matrix-game program with selection criterion for determination of optimal tool set for computer system protection. Mathematical Structures and Modeling. 2016;2(38):103-115. (In Russ)

6. Bykov A.Yu., Grishunin M.V., Krygin I.A. The game problem of selection of assets to protect and research of saddle point search algorithm based on Brown-Robinson method modification. Voprosy kiberbezopasnosti. 2019;2(30):2-12. Available at: https://cyberrus.com/wp-content/uploads/2019/07/2-12-230-19_1.-Bykov.pdf DOI: 10.21681/2311-3456-2019-2-2-12 (accessed 28.07.2021). (In Russ)

7. Bykov A.Yu., Krygin I.A., Grishunin M.V., et al. On one saddle point search algorithm for continuous linear games as applied to information security problems. Herald of the Bauman Moscow State Technical University. Series Instrument Engineering. 2020;4(133):58-74. Available at: http://vestnikprib.ru/eng/catalog/icec/insec/1205.html DOI: 10.18698/0236-3933-2020-4-58-74 (accessed 28.07.2021). (In Russ)

8. Bykov A.Yu., Krygin I.A., Grishunin M.V. The problem of selecting computing processes that provide information protection for servers of a distributed system and algorithms for its solution. Voprosy kiberbezopasnosti. 2020;5(39):30-44. Available at: https://cyberrus.com/wp-content/uploads/2020/12/30-44-539-20_3.-Bykov.pdf DOI: 10.21681/2311-3456-2020-05-30-44 (accessed 28.07.2021). (In Russ)

9. Vorob'ev N.N. Teoriya igr dlya ehkonomistov-kibernetikov. M.: Nauka. 1985. (In Russ)

10. Sushkin V.V. About finding all nondominated maximin strategies of one of the players in a two-person noncooperative game that models a process of purchasing protection means for a computer system. Modeling, Optimization and Information Technology. 2019;7(3). Available at: https://moitvivt.ru/ru/journal/pdf?id=664 DOI: 10.26102/2310-6018/2019.26.3.036 (accessed 28.07.2021). (In Russ)

11. Vorob'ev N.N. Osnovy teorii igr. Beskoalitsionnye igry. M.: Nauka. 1984. (In Russ)

12. Mulen Eh. Teoriya igr s primerami iz matematicheskoi ehkonomiki. M.: Mir. 1985. (In Russ)

13. Lagunov V.N. Vvedenie v differentsial'nye igry. Vil'nyus: Institut matematiki i kibernetiki AN Litovskoi SSR. 1979. (In Russ)

14. Sushkin V.V., Dozmorov E.D. About finding nondominated maximin strategies of one of the players in a two-person noncooperative game that models a process of purchasing protection means for a computer system. Matematicheskie metody upravleniya: Sb. nauchn. tr. – Tver: Tver State University. 2019;23-31. (In Russ)

Sushkin Vyacheslav Vyacheslavovich
Candidate of Physical and Mathematical Sciences, Associate Professor, Department of Computer Security and Mathematical Control Methods, Faculty of Mathematics
Email: vsushkin@mail.ru

Tver State University

Tver, Russian Federation

Keywords: noncooperative game, maximin strategy, nondominated strategy, lexicographically maximin strategy, computer system, attack on a computer system, protection of a computer system

For citation: Sushkin V.V. About finding lexicographically maximin strategies of one of the players in a two-person noncooperative game that models a process of purchasing protection means for a computer system. Modeling, Optimization and Information Technology. 2021;9(3). Available from: https://moitvivt.ru/ru/journal/pdf?id=1031 DOI: 10.26102/2310-6018/2021.34.3.018 (In Russ).

315

Full text in PDF

Received 03.08.2021

Revised 16.09.2021

Accepted 17.09.2021

Published 11.10.2021