Journal of Information Security

Volume 1, Issue 1 (July 2010)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Game Theory Based Network Security

HTML  Download Download as PDF (Size: 490KB)  PP. 41-44  
DOI: 10.4236/jis.2010.11005    7,165 Downloads   16,609 Views  Citations

Affiliation(s)

.

ABSTRACT

The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization methodology is used to predict the attacker’s best actions at each decision node. The administrator also keeps tracking the attacker’s actions and updates his knowledge on the attacker’s behavior and objectives after each detected attack, and uses it to update the prediction of the attacker’s future actions. Instead of searching the entire game tree, appropriate time horizons are dynamically determined to reduce the size of the game tree, leading to a new, fast, adaptive learning algorithm. Numerical experiments show that our algorithm has a significant reduction in the damage of the network and it is also more efficient than other existing algorithms.

Share and Cite:

Y. Luo, F. Szidarovszky, Y. Al-Nashif and S. Hariri, "Game Theory Based Network Security," Journal of Information Security, Vol. 1 No. 1, 2010, pp. 41-44. doi: 10.4236/jis.2010.11005.

Cited by

[1] Trapped in Transparency: Analyzing the Effectiveness of Security Defenses in Real-World Scenarios
2022
[2] A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks
2021 IEEE Canadian Conference on …, 2021
[3] Information Security Games: A Survey
2021
[4] A Novel Multi Optimization Based Genetic Algorithm for Network Security
2021
[5] A memory-based game-theoretic defensive approach for digital forensic investigators
Forensic Science International …, 2021
[6] A Review on Defense Strategy Security Mechanism for Sensor Network
Smart Sensor Networks Using AI for …, 2021
[7] The Development of a Model of the Formation of Cybersecurity Outlines Based on Multi Criteria Optimization and Game Theory
2020
[8] Adversarial detection games in network security applications with imperfect and incomplete information
2020
[9] A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour
2020
[10] Toward realizing self-protecting healthcare information systems: Design and security challenges
2019
[11] Automotive Cybersecurity
2019
[12] Dynamic Games in Cyber-Physical Security: An Overview
2019
[13] Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems
2018
[14] Autonomous Computer Security Game: Techniques, Strategy and Investigation
2018
[15] Game Theory based Attack Graph Analysis for Cyber War Strategy
2018
[16] Development of cybersecurity mandate for Indian oil and gas industry
2018
[17] Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts
ProQuest Dissertations Publishing, 2017
[18] An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
2017
[19] How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
2017
[20] A Markov game privacy preserving model in retail applications
IEEE MowNet 2017, International conference on selected topics in Mobile and Wireless Networking, 2017
[21] Attacks and defenses in mobile ip: Modeling with stochastic game petri net
arXiv preprint, 2017
[22] How Shall We Play a Game?
IEEE 30th Computer Security Foundations Symposium (CSF), 2017
[23] An Evolutionary Approach of Attack Graph to Attack Tree Conversion
2017
[24] Dynamic Game Theories in Cyber Security
2016
[25] Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers
ProQuest Dissertations Publishing, 2016
[26] Game‐Theoretic Computing in Cyber‐Risk
Cyber-Risk Informatics: Engineering Evaluation with Data Science, 2016
[27] A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Future Internet, 2016
[28] Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
2016
[29] Optimization of rootkit revealing system resources–A game theoretic approach
Journal of King Saud University-Computer and Information Sciences, 2015
[30] Quantifying mixed uncertainties in cyber attacker payoffs
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, 2015
[31] HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
arXiv preprint arXiv:1511.04389, 2015
[32] Constituents of the domain specific cyber security mandate for the Indian power sector
2015
[33] Informatikai algoritmusok 2.
2015
[34] Informatikai algoritmusok. 2. kötet. Párhuzamos módszerek és optimalizáció
2014
[35] A study of adaptive learning for educational game design
ProQuest Dissertations Publishing, 2014
[36] Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014
[37] A multiresolution approach for optimal defense against random attacks
International Journal of Information Security, 2014
[38] A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
Q Chen, S Abdelwahed, A Erradi - ieeexplore.ieee.org, 2014
[39] A game-theory analysis of the rat-group attack in smart grids
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 2014
[40] Model-based autonomic security management of networked distributed systems
ProQuest Dissertations Publishing, 2014
[41] Game Theory and Information Security
2014
[42] Game theory for network security
Communications Surveys & Tutorials, IEEE, 2013
[43] Game‐theoretic computing in risk analysis
Wiley Interdisciplinary Reviews: Computational Statistics, 2012
[44] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
Decision and Game Theory for Security, 2012
[45] Decision support using deterministic equivalents of probabilistic game trees
Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International Conference and Workshops on. IEEE, 2012
[46] An Evolutionary Game Theory Approach for Intelligent Patrolling
Procedia Computer Science, 2012
[47] Vulnerability assessment of a food supply chain to an intentional attack
Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012
[48] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
GameSec: International Conference on Decision and Game Theory for Security, 2012
[49] New multi-objective evolutionary game theory algorithm for border security
2012
[50] On optimal strategies in protecting computer networks
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. IEEE, 2011
[51] Game Theory–A Way to Network Security

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.