The Hacking Game: CrossImpact Analysis Tool - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

The Hacking Game: CrossImpact Analysis Tool

Description:

The Hacking Game. Participation in the game occurs in a virtual space ... The Hacking Game Components. Security and roles. Player/team management ... – PowerPoint PPT presentation

Number of Views:175
Avg rating:3.0/5.0
Slides: 17
Provided by: arth87
Category:

less

Transcript and Presenter's Notes

Title: The Hacking Game: CrossImpact Analysis Tool


1
The Hacking Game Cross-Impact Analysis Tool

Art Hendela, PhD student, art.hendela_at_hendela.com
2
Introduction
  • The Problem
  • Types of Games
  • The Hacking Game
  • Cross Impact Analysis
  • The Hacking Game Components
  • Technology Used
  • Future Work

3
The Problem
  • Protect a computer network from attack with
    limited resources
  • Determine the allocation of those resources with
    the help of a mathematical model

4
Types of Games
  • Economic Games
  • Cooperative, i.e., joint venture (Aloysius,2002)
  • Non-Cooperative, business competitors (Garcia,
    2003)
  • Mixed (Nash, 1951)
  • Combinatorial Games
  • Two person with perfect knowledge (Berlekamp 1982
    )

5
The Hacking Game
  • Participation in the game occurs in a virtual
    space
  • No scenario is pre-determined
  • Input is limited to your allotted budget
  • Uses a mathematical model to aid resource
    allocation
  • Model is based on Cross Impact Analysis

6
Cross Impact Analysis
  • From a paper by Murray Turoff in 1972 entitled,
    An Alternative Approach to Cross Impact
    Analysis
  • Used for determining influences between events
  • Uses the Delphi Method to help generate group
    statistics for impact (Turoff, 1970)

7
Cross Impact Analysis Inputs
  • A set of base events
  • The probability of each base event occurring
    independent of the other events, Pi
  • The set of probabilities for all other events
    where an individual base event is certain to
    occur, Rij
  • The set of probabilities for all other events
    where an individual base event is certain to
    never occur, Sij

8
Cross Impact Analysis Outputs
  • The relative impact of one event on another, Cij
  • The influence by external events not entered, Gi

9
The Hacking Game Components
Security System
Component Library
Game Definition
Event Library
Cross Impact Calculation Engine
Players
Probabilities
Teams
Results
Survey
10
The Hacking Game Components
  • Security and roles
  • Player/team management
  • Game Definition with Budgets
  • Components
  • Events
  • Probabilities
  • Calculation Engine
  • Results reporting
  • Survey/evaluation

11
Technology Used
  • Code Framework ASP.NET 2.0
  • Development Environment Visual Studio 2005
  • Language Visual Basic, VB.NET
  • Database MS SQLServer 2000

12
Future Work
  • Complete development of the model
  • Field test and evaluate the game
  • Expand the use of the approach to non-network
    hacking environments that feature an
    offense/defense structure
  • Protect chemical plants from terrorism
  • Launch a new product against a business competitor

13
Acknowledgements
  • This research is fully supported by Hendela
    System Consultants, Inc, Little Falls, NJ
    (www.hendela.com). The opinions expressed are
    those of the authors and may not reflect those of
    the corporate sponsor.

14
Selected References
  • Aloysius, J. A. (2002). "Research Joint Ventures
    A Cooperative Game for Competitors." European
    Journal of Operational Research 136(3) 591-602.
  • Berlekamp, E., Conway, J, and Guy, R. (1982).
    Winning Ways for your Mathematical Plays,
    Academic Press.

15
Selected References
  • Garcia, D. D., David Ganet, Peter Henderson
    (2003). "Everything you Always Wanted to Know
    about Game Theory (But were Afraid to Ask)."
    SIGCSE 2003 35(1) 96-97.
  • Nash, J. F. (1951). "Non-Cooperative Games."
    Annals of Mathematics Journal 54(1951) 286-295.

16
Selected References
  • Turoff, M, (1970). The Design of a Policy
    Delphi, Technology Forecasting and Social
    Change, 2(2).
  • Turoff, M, (1972). An alternative approach to
    Cross Impact Analysis." Technology Forecasting
    and Social Change, 3, 338-368.
Write a Comment
User Comments (0)
About PowerShow.com