2013
DOI: 10.1145/2480741.2480742
|View full text |Cite
|
Sign up to set email alerts
|

Game theory meets network security and privacy

Abstract: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that uses game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
331
0
3

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 671 publications
(349 citation statements)
references
References 102 publications
1
331
0
3
Order By: Relevance
“…26. The strategic component of attributing cyberattacks has been studied in the context of single attacks against specific systems using game theory (27)(28)(29)(30), but these models do not account for the larger sociopolitical landscape. This broader context has been studied qualitatively using a variety of models (15,31,32).…”
Section: Significancementioning
confidence: 99%
“…26. The strategic component of attributing cyberattacks has been studied in the context of single attacks against specific systems using game theory (27)(28)(29)(30), but these models do not account for the larger sociopolitical landscape. This broader context has been studied qualitatively using a variety of models (15,31,32).…”
Section: Significancementioning
confidence: 99%
“…That game model will be given as the output of KMS to the GCU. Then GCU takes prescribed sequence of action as per that game model 8 .…”
Section: Operational Flowmentioning
confidence: 99%
“…( ) 8,6 is the prescribed  -NOSP. It recommends for the user to be less aggressive as he is more affective while the administrator to be quite aggressive.…”
Section: Average User (Au)mentioning
confidence: 99%
“…In this work, they have used a specific network model, and assumed knowledge of topology and sessions. A similar approach for random networks with random connections could shed valuable insights on scaling behavior of anonymous communication The work [7,8] presented a framework to classify DoS attacks into single-and multi-source attacks. In addition to using packet headers to classify the attacks, they develop two new approaches: initial ramp-up transients and spectral analysis.…”
Section: Literature Reviewmentioning
confidence: 99%