Game Theory and Information Security

被引:0
|
作者
Meng Xianghong [1 ]
Wang Xiaoli [2 ]
机构
[1] Hulunbeier Coll, Sch Comp Sci & Technol, Hailaer 021008, Peoples R China
[2] Hulunbeier Coll, Sch Media & Commun, Hailaer 021008, Peoples R China
关键词
Information Security; Game Theory; Offense; Defense;
D O I
10.4028/www.scientific.net/AMM.446-447.1625
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The interactions between attackers and network administrator are modeled as a non-zero-sum dynamic game with incomplete information. Strategies taken by offenders and defenders are dynamic game processes which are mutually dependable and constantly repeated. This paper uses game theory to analyze the model and process of offense and defense counterwork, and suggests that information security problems can be studied from game theory's point of view.
引用
收藏
页码:1625 / +
页数:3
相关论文
共 50 条
  • [1] Game Theory Meets Information Security Management
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 15 - 29
  • [2] A Game Theory Approach in Information Security Risk Study
    Shing, Marn-Ling
    Shing, Chen-Chi
    Chen, Kuo Lane
    Lee, Huei
    [J]. E-BUSINESS, MANAGEMENT AND ECONOMICS, 2011, 3 : 201 - +
  • [3] Information Security Problem Research Based on Game Theory
    Sun, Wei
    Kong, Xiangwei
    He, Dequan
    You, Xingang
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 554 - 557
  • [4] Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
    Sadkhan, Sattar B.
    Reda, Dhilal M.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND THEIR APPLICATIONS (IICETA), 2018, : 118 - 123
  • [5] Research on Information Security Cost Based on Game-Theory
    Zuo, Zheng
    Fang, Yong
    Liu, Liang
    Fang, Fang
    Hu, Xingrong
    [J]. PROCEEDINGS OF THE 2013 IEEE 8TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2013, : 1433 - 1436
  • [6] Security of Networked Control Systems with Incomplete Information Based on Game Theory
    Gao, Lei
    Sun, Jian
    Li, Jun
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 6701 - 6706
  • [7] Information Theory in Game Theory
    Khouzani, M. H. R.
    Malacaria, Pasquale
    [J]. ENTROPY, 2018, 20 (11)
  • [8] Game Theory for Network Security
    Liang, Xiannuan
    Xiao, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 472 - 486
  • [9] Incentive Mechanism Design Based on Repeated Game Theory in Security Information Sharing
    Xiong Qiang
    Chen Xiaoyan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND SOCIAL RESEARCH (ICSSR 2013), 2013, 64 : 399 - 401
  • [10] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    [J]. INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824