2010
DOI: 10.4236/jis.2010.11005
|View full text |Cite
|
Sign up to set email alerts
|

Game Theory Based Network Security

Abstract: The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization methodology is used to predict the attacker’s best actions at each decision node. The administrator also keeps tracki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…Non-cooperative game theory has been widely used to model the interdependency of defenders and attackers in; e.g., [12,13,14,15,16,19,21]. A number of algorithms have been proposed to compute Nash equilibrium and further infer the actions of attackers in; e.g., [2].…”
Section: Related Workmentioning
confidence: 99%
“…Non-cooperative game theory has been widely used to model the interdependency of defenders and attackers in; e.g., [12,13,14,15,16,19,21]. A number of algorithms have been proposed to compute Nash equilibrium and further infer the actions of attackers in; e.g., [2].…”
Section: Related Workmentioning
confidence: 99%
“…Luo et al in 2010 published a noncooperative nondynamic game scenario with incomplete information [46]. Recently, problems in counterterrorism and corporate competition have prompted applied research that attempts to combine math-statistical risk analysis with game theory in ways that support practical decision making.…”
Section: Applications Of Game Theory To Cyber-security Riskmentioning
confidence: 99%
“…Robust stochastic models [10] have been developed to deal with incomplete information. Luo [11] used a multiobjective optimization methodology to predict the attacker's best action, assuming a sequential learning situation. Algorithms have been developed for situation assessment, given noise corrupted observations [12].…”
Section: Literature Reviewmentioning
confidence: 99%