Security in Networks: A Game-Theoretic Approach

被引:3
|
作者
Gueye, Assane [1 ]
Walrand, Jean C. [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
Security; Intrusion; Viruses; Deception; Game Theory;
D O I
10.1109/CDC.2008.4739431
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores network security as a game between attacker and defender. In this game, the attacker and defender both anticipate each other's best strategy. Thus, instead of focusing on the best response to an attack, the paper analyzes the Nash equilibrium for the joint strategies. The paper studies two types of problem. The first type concerns networks where the data can be modified by an intruder. Given the probability that such an intruder exists, the network user decides whether to trust the data he observes. When present, the intruder chooses how to corrupt the data. The second type models virus attacks. The virus designer decides how aggressive the virus should be and the defender chooses a mechanism to detect the virus. If the virus is too aggressive, it is easy to detect. Accordingly, there is an optimum level of aggressiveness.
引用
收藏
页码:829 / 834
页数:6
相关论文
共 50 条
  • [1] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [2] ALOHA networks: a game-theoretic approach
    Marban, Sebastian
    van de Ven, Peter
    Borm, Peter
    Hamers, Herbert
    [J]. MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2013, 78 (02) : 221 - 242
  • [3] A Game-theoretic approach to security and power conservation in wireless sensor networks
    [J]. Agah, A. (aagah@wcupa.edu), 1600, Femto Technique Co., Ltd. (15):
  • [4] ALOHA networks: a game-theoretic approach
    Sebastián Marbán
    Peter van de Ven
    Peter Borm
    Herbert Hamers
    [J]. Mathematical Methods of Operations Research, 2013, 78 : 221 - 242
  • [5] Security of Vehicle Platooning: A Game-Theoretic Approach
    Basiri, Mohammad Hossein
    Pirani, Mohammad
    Azad, Nasser L.
    Fischmeister, Sebastian
    [J]. IEEE ACCESS, 2019, 7 : 185565 - 185579
  • [6] Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
    Lavrova, D. S.
    Solovei, R. S.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 937 - 943
  • [7] Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
    D. S. Lavrova
    R. S. Solovei
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 937 - 943
  • [8] JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH
    Bhattacharya, Sourabh
    Gupta, Abhishek
    Basar, Tamer
    [J]. NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION, 2013, 3 (01): : 1 - 30
  • [9] A game-theoretic approach to Artificial Immune networks
    Velez, M
    Nino, F
    Alonso, OM
    [J]. ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2004, 3239 : 372 - 385
  • [10] A game-theoretic approach for Generative Adversarial Networks
    Franci, Barbara
    Grammatico, Sergio
    [J]. 2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 1646 - 1651