2019
DOI: 10.1109/access.2019.2948356
|View full text |Cite
|
Sign up to set email alerts
|

Game Theoretical Modelling of Network/Cybersecurity

Abstract: Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of decision makers in security problems who compete for limited and shared resources. This article presents a review of the literature in the area of game theoretical modelling of network/cybersecurity and identifies a number of challenges in this area that need to be addressed. INDEX TERMS Cyberspace, mathematical model, optimiza… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(21 citation statements)
references
References 59 publications
0
10
0
Order By: Relevance
“…where stakeholders face vulnerable situation (risk/uncertain situation) leading to a dependence or reliance on management for security [50,51]. Shareholders must trust managers, employers must trust employees, buyers must trust sellers, the public must trust business, and the government must trust business.…”
Section: Definition Of Trustmentioning
confidence: 99%
“…where stakeholders face vulnerable situation (risk/uncertain situation) leading to a dependence or reliance on management for security [50,51]. Shareholders must trust managers, employers must trust employees, buyers must trust sellers, the public must trust business, and the government must trust business.…”
Section: Definition Of Trustmentioning
confidence: 99%
“…In general, although game theory is based on optimization, it is the appropriate tool when the optimal decision of one entity (player) depends on the decision of the other player. The rules for predicting how a game will be played defines the solution concepts in terms of which the game is understood [ 31 ].…”
Section: One-shot Gamementioning
confidence: 99%
“…In conclusion, in the considered framework, a defender’s strategy belongs to the NE if it is is the best reply to the attacker’s strategy, and vice versa. In a NE, “unilateral deviations”, which refer to the case that one player changes its own decision while the others stick to their current choices, do not benefit any of the players [ 31 ].…”
Section: One-shot Gamementioning
confidence: 99%
See 1 more Smart Citation
“…Such updates are executed regularly, usually once a day or once a week, giving rise to the so-called Internet security ''cat and mouse game''. Actually, as soon as an anti-virus software update is released, by using dedicated bot update modules [24]- [27] botmasters change the signature code of the virus and its behavior. Novel fully undetectable versions of the virus are produced and the virus ultimately evolves through multiple generations [28]- [30].…”
Section: Introductionmentioning
confidence: 99%