2010
DOI: 10.1007/978-3-642-17197-0_9
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 9 publications
0
27
0
Order By: Relevance
“…As observed in (Bensoussan, Kantarcioglu, & Hoe, 2013), the strategies for malware filtering adopted by one host in the network may have impacts on other hosts' strategies, and these interdependent security decisions could be well represented by combining game theoretic modelling with epidemic modelling. Reference (Alese, Iwasokun, & Haruna, 2013) studied deterministic security game frameworks and its adoption to enhance strategic model interactions between attacker and defender in a network environment.…”
Section: Modelling Malware Epidemics 2 Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As observed in (Bensoussan, Kantarcioglu, & Hoe, 2013), the strategies for malware filtering adopted by one host in the network may have impacts on other hosts' strategies, and these interdependent security decisions could be well represented by combining game theoretic modelling with epidemic modelling. Reference (Alese, Iwasokun, & Haruna, 2013) studied deterministic security game frameworks and its adoption to enhance strategic model interactions between attacker and defender in a network environment.…”
Section: Modelling Malware Epidemics 2 Related Workmentioning
confidence: 99%
“…In (Omic & Orda, 2009), a unified framework that combines the SIS epidemic model with a non-cooperative game model was proposed, which failed to account for the strategies of the attacker. In (Bensoussan et al, 2013), a differential game model was developed based on the interactions between botnet herders and defending group, with the state evolving according to a modified SIS epidemic model. The model accounted for the strategies of the botnet herder under a fixed level of defense, and also considered a continuous game between the herder and the defender.…”
Section: Modelling Malware Epidemics 2 Related Workmentioning
confidence: 99%
“…[2] that considers games in online dating platforms, or [35] that considers network formation games in which the utilities includes a term representing the metastable infection probability. Some examples of fully dynamic cybersecurity epidemic games are [21] (already mentioned) as well as [10].…”
Section: Epidemic Games For Cyber-security and Content Diffusionmentioning
confidence: 99%
“…On a side note, they did not mention which type of verification protocol (deterministic or probabilistic) they used. Besides the Cloud, game theory has already been applied to study network security [7] [1], intrusion detection [5], Botnet defense [4], etc. The work presented in this paper was actually strongly inspired by [5].…”
Section: Approaches Related To Game Theorymentioning
confidence: 99%