SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.

 

Article citations

More>>

K. Lye and J. Wing, “Game Strategies in Network Secu-rity,” International Journal of Information Security, Vol. 4, 2005, pp. 71-86.

has been cited by the following article:

  • TITLE: Game Theory Based Network Security

    AUTHORS: Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif, Salim Hariri

    KEYWORDS: Multi-Stage Attack, Dynamic Game, Multi-Objective Optimization, Adaptive Learning

    JOURNAL NAME: Journal of Information Security, Vol.1 No.1, July 30, 2010

    ABSTRACT: The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization methodology is used to predict the attacker’s best actions at each decision node. The administrator also keeps tracking the attacker’s actions and updates his knowledge on the attacker’s behavior and objectives after each detected attack, and uses it to update the prediction of the attacker’s future actions. Instead of searching the entire game tree, appropriate time horizons are dynamically determined to reduce the size of the game tree, leading to a new, fast, adaptive learning algorithm. Numerical experiments show that our algorithm has a significant reduction in the damage of the network and it is also more efficient than other existing algorithms.