Game Theory and Information Security

被引:0
|
作者
Meng Xianghong [1 ]
Wang Xiaoli [2 ]
机构
[1] Hulunbeier Coll, Sch Comp Sci & Technol, Hailaer 021008, Peoples R China
[2] Hulunbeier Coll, Sch Media & Commun, Hailaer 021008, Peoples R China
关键词
Information Security; Game Theory; Offense; Defense;
D O I
10.4028/www.scientific.net/AMM.446-447.1625
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The interactions between attackers and network administrator are modeled as a non-zero-sum dynamic game with incomplete information. Strategies taken by offenders and defenders are dynamic game processes which are mutually dependable and constantly repeated. This paper uses game theory to analyze the model and process of offense and defense counterwork, and suggests that information security problems can be studied from game theory's point of view.
引用
收藏
页码:1625 / +
页数:3
相关论文
共 50 条
  • [31] A Stochastic Game Model with Imperfect Information in Cyber Security
    Shiva, Sajjan
    Roy, Sankardas
    Bedi, Harkeerat
    Dasgupta, Dipankar
    Wu, Qishi
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 308 - 318
  • [32] Information Security Theory for the Future Internet
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 150 - 157
  • [33] Algorithmic Information Theory for Obfuscation Security
    Mohsen, Rabih
    Pinto, Alexandre Miranda
    [J]. 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 76 - 87
  • [34] Network Security Transmission Based on Bimatrix Game Theory
    ZHENG Ying
    [J]. Wuhan University Journal of Natural Sciences, 2006, (03) : 617 - 620
  • [35] Game theory in network security for digital twins in industry
    Hailin Feng
    Dongliang Chen
    Haibin Lv
    Zhihan Lv
    [J]. Digital Communications and Networks., 2024, 10 (04) - 1078
  • [36] A Game Theory Based Solution for Security Challenges in CRNs
    Poonam
    Nagpal, Chander Kumar
    [J]. 3D RESEARCH, 2018, 9 (01):
  • [37] Game theory in network security for digital twins in industry
    Feng, Hailin
    Chen, Dongliang
    Lv, Haibin
    Lv, Zhihan
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (04) : 1068 - 1078
  • [38] Game Theory and Security: Recent History and Future Directions
    Merlevede, Jonathan S. A.
    Holvoet, Tom
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 334 - 345
  • [39] Using Game Theory for Los Angeles Airport Security
    Pita, James
    Jain, Manish
    Ordonez, Fernando
    Portway, Christopher
    Tambe, Milind
    Western, Craig
    Paruchuri, Praveen
    Kraus, Sarit
    [J]. AI MAGAZINE, 2009, 30 (01) : 43 - 57
  • [40] The Game Theory Narrative and the Myth of the National Security State
    Belletto, Steven
    [J]. AMERICAN QUARTERLY, 2009, 61 (02) : 333 - 357