Security in Networks: A Game-Theoretic Approach

被引:3
|
作者
Gueye, Assane [1 ]
Walrand, Jean C. [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
Security; Intrusion; Viruses; Deception; Game Theory;
D O I
10.1109/CDC.2008.4739431
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores network security as a game between attacker and defender. In this game, the attacker and defender both anticipate each other's best strategy. Thus, instead of focusing on the best response to an attack, the paper analyzes the Nash equilibrium for the joint strategies. The paper studies two types of problem. The first type concerns networks where the data can be modified by an intruder. Given the probability that such an intruder exists, the network user decides whether to trust the data he observes. When present, the intruder chooses how to corrupt the data. The second type models virus attacks. The virus designer decides how aggressive the virus should be and the defender chooses a mechanism to detect the virus. If the virus is too aggressive, it is easy to detect. Accordingly, there is an optimum level of aggressiveness.
引用
收藏
页码:829 / 834
页数:6
相关论文
共 50 条
  • [41] Interference Alignment for Cooperative Femtocell Networks: A Game-Theoretic Approach
    Pantisano, Francesco
    Bennis, Mehdi
    Saad, Walid
    Debbah, Merouane
    Latva-aho, Matti
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (11) : 2233 - 2246
  • [42] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    M. Pilz
    F. Baghaei Naeini
    K. Grammont
    C. Smagghe
    M. Davis
    J.-C. Nebel
    L. Al-Fagih
    E. Pfluegel
    [J]. International Journal of Information Security, 2020, 19 : 427 - 443
  • [43] Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
    Jin, Richeng
    He, Xiaofan
    Dai, Huaiyu
    Dutta, Rudra
    Ning, Peng
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 72 - 83
  • [44] A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
    Abdalzaher, Mohamed S.
    Muta, Osamu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 11250 - 11261
  • [45] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443
  • [46] A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
    Rontidis, George
    Panaousis, Emmanouil
    Laszka, Aron
    Dagiuklas, Tasos
    Malacaria, Pasquale
    Alpcan, Tansu
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2639 - 2644
  • [47] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [48] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [49] CHECKMATE: Automated Game-Theoretic Security Reasoning
    Brugger, Lea Salome
    Kovacs, Laura
    Komel, Anja Petkovic
    Rain, Sophie
    Rawson, Michael
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1407 - 1421
  • [50] A GAME-THEORETIC APPROACH TO NETWORK EQUILIBRIUM
    HAURIE, A
    MARCOTTE, P
    [J]. MATHEMATICAL PROGRAMMING STUDY, 1986, 26 : 252 - 255