2014
DOI: 10.1007/978-3-319-12601-2_18
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 8 publications
0
18
0
Order By: Relevance
“…Game-theoretic models are natural frameworks to capture the adversarial and defensive interactions between players [9,14,15,20,21,37,66,72,77,83]. Game theory can provide a quantitative measure of the quality of protection with the concept of Nash equilibrium where both defender and an attacker seek optimal strategies, and no one has an incentive to deviate unilaterally from their equilibrium strategies despite their conflict for security objectives.…”
Section: Tutorial Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Game-theoretic models are natural frameworks to capture the adversarial and defensive interactions between players [9,14,15,20,21,37,66,72,77,83]. Game theory can provide a quantitative measure of the quality of protection with the concept of Nash equilibrium where both defender and an attacker seek optimal strategies, and no one has an incentive to deviate unilaterally from their equilibrium strategies despite their conflict for security objectives.…”
Section: Tutorial Descriptionmentioning
confidence: 99%
“…The tutorial will be organized to connect different classes of games with different sets of security problems. For example (1) Stackelberg and multi-layer games for proactive defense [8, 26, 68, 70-72, 76, 80, 82], (2) network games for cyber-physical security that deals with critical infrastructure protection and information assurance [3,15,21,36,54,[56][57][58][59][60], (3) dynamic games for adaptive defense for network security [9,16,17,24,66,67,78,79,81], (4) mechanism design theory for economics of network security that investigates resource allocation methodologies [2,5,11,13,61,64,[73][74][75], and (5) game-theoretic analysis of cryptographic concepts, such as perfectly confidentiality and authentication (in classical and quantum networks) [47][48][49][50], network design and -provisioning [30-32, 45, 46, 53] and quantitative security risk management [33-35, 38-44, 51, 52] From the perspective of cybersecurity, the topics of this tutorial will cover recent applications of game theory to several emerging topics such as cross-layer cyber-physical security [6,21,29,59,69,77], cyber deception…”
Section: Tutorial Descriptionmentioning
confidence: 99%
“…An optimal defense strategy based on the stochastic game theoretic scheme is reported in Jiang et al 11 Farhang et al 12 modeled a Bayesian game to analyze the interactions between a server and its end user, that is, either a legitimate user or an attacker, where the optimal strategy of the defender only depends on the attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Integration of the interactive behaviors among the attackers, defenders and users with game theoretic approach is proposed in Ryutov et al 10 The advantage is that for the first time, users are considered as the independent players, where their incentives and behaviors affect the game process. An optimal defense strategy based on the stochastic game theoretic scheme is reported in Jiang et al 11 Farhang et al 12 modeled a Bayesian game to analyze the interactions between a server and its end user, that is, either a legitimate user or an attacker, where the optimal strategy of the defender only depends on the attackers.…”
Section: Introductionmentioning
confidence: 99%
“…We model the interaction between the cloud and the connected device using a signaling game, which provides a framework for modeling dynamic interactions in which one player operates based on a belief about the private information of the other. A significant body of research has utilized this framework for security [7,9,15,21,8]. The signaling and FlipIt games are coupled, because the outcome of the FlipIt game determines the likelihood of benign and malicious attackers in the robotic signaling game.…”
Section: Introductionmentioning
confidence: 99%