| Peer-Reviewed

Game Theory Basics and Its Application in Cyber Security

Received: 25 May 2017    Accepted: 4 July 2017    Published: 27 July 2017
Views:       Downloads:
Abstract

The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.

Published in Advances in Wireless Communications and Networks (Volume 3, Issue 4)
DOI 10.11648/j.awcn.20170304.13
Page(s) 45-49
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Game Theory, Cyber Security, Security Games, Players

References
[1] M. J. Osborne, “An Introduction to Game Theory by Please send comments to Department of Economics This version ,” 2000.
[2] A. Fielder, E. Panaousis, P. Malacaria, C. Hankin, and F. Smeraldi, “Game Theory Meets Information Security Management,” in Information Security and Privacy Conference, 2014, 2014, pp. 15–29.
[3] K. Lye and J. Wing, “Game Strategies in Network Security,” Copenhagen, Denmark, 2002.
[4] S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A survey of game theory as applied to network security,” Syst. Sci. (HICSS), 2010 43rd Hawaii Int. Conf., pp. 1–10, 2010.
[5] John. F. Nash, “Equilibrium Points in n-Person Games,” in Proceedings of the National Academy of Sciences of the United States of America, Published by : National Academy of Sciences, 2013, vol. 36, no. 1, pp. 48–49.
[6] C. F. Camerer, T. Ho, and J. K. Chong, “Behavioural Game Theory: Thinking, Learning and Teaching ∗.”
[7] A. Gueye, “A Game Theoretical Approach to Communication Security,” 2011.
[8] K. Leyton-Brown and Y. Shoham, Essentials of game theory. Morgan & Claypool Publishers series, 2008.
[9] S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, “Challenges in Applying Game Theory to the Domain of Information Warfare,” Proc. 4th Inf. Surviv. Work., 2002.
[10] A. Chakrabarti and G. Manimaran, “Internet Infrastructure Security: A Taxonomy,” IEEE Netw., no. December, pp. 13–21, 2002.
[11] J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39–53, 2004.
[12] J. P. Hespanha and S. Bohacek, “Preliminary Results in Routing Games,” Am. Control Conf. 2001. Proc. 2001. IEEE, vol. 3, pp. 1904–1909, 2001.
[13] J. McInerney, S. Stubberud, and S. Anwar, “Friars: a feedback control system for information assurance using a markov decision process,” Technol. 2001, 2001.
[14] P. F. Syverson, “A different look at secure distributed computation,” in Proceedings 10th Computer Security Foundations Workshop, 1997, pp. 109–115.
[15] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proc. 6th Annu., 2000.
[16] Y. Liu, C. Comaniciu, and H. Man, “Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection,” Int. J. Secur. Networks, vol. 1, no. 3/4, p. 243, 2006.
[17] Z. Shuang-can, H. Chen-jun, and W. Zhang, “Distributed intrusion detection system based on BP neural network,” Int. J. Secur. its Appl., vol. 8, no. 2, pp. 183–192, 2009.
[18] M. Kodialam and T. V Lakshman, “Detecting Network Intrusions via Sampling: A Game Theoretic Approach,” Infocom, vol. 0, no. C, 2003.
[19] A. Agah, S. K. Das, and K. Basu, “A game theory based approach for security in wireless sensor networks,” in IEEE International Conference on Performance, Computing, and Communications, 2004, 2004, pp. 259–263.
[20] T. Alpcan and T. Basar, “A game theoretic approach to decision and analysis in network intrusion detection,” in 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), 2003, vol. 3, pp. 2595–2600.
[21] Syverson, P. F, "A different look at secure distributed computation". In Proceedings 10th Computer Security Foundations Workshop, IEEE Comput. Soc. Press. http://doi.org/10.1109/CSFW.1997.59679, 1997, pp. 109–115.
Cite This Article
  • APA Style

    Amadi Emmanuuel Chukwudi, Eze Udoka, Ikerionwu Charles. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, 3(4), 45-49. https://doi.org/10.11648/j.awcn.20170304.13

    Copy | Download

    ACS Style

    Amadi Emmanuuel Chukwudi; Eze Udoka; Ikerionwu Charles. Game Theory Basics and Its Application in Cyber Security. Adv. Wirel. Commun. Netw. 2017, 3(4), 45-49. doi: 10.11648/j.awcn.20170304.13

    Copy | Download

    AMA Style

    Amadi Emmanuuel Chukwudi, Eze Udoka, Ikerionwu Charles. Game Theory Basics and Its Application in Cyber Security. Adv Wirel Commun Netw. 2017;3(4):45-49. doi: 10.11648/j.awcn.20170304.13

    Copy | Download

  • @article{10.11648/j.awcn.20170304.13,
      author = {Amadi Emmanuuel Chukwudi and Eze Udoka and Ikerionwu Charles},
      title = {Game Theory Basics and Its Application in Cyber Security},
      journal = {Advances in Wireless Communications and Networks},
      volume = {3},
      number = {4},
      pages = {45-49},
      doi = {10.11648/j.awcn.20170304.13},
      url = {https://doi.org/10.11648/j.awcn.20170304.13},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20170304.13},
      abstract = {The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Game Theory Basics and Its Application in Cyber Security
    AU  - Amadi Emmanuuel Chukwudi
    AU  - Eze Udoka
    AU  - Ikerionwu Charles
    Y1  - 2017/07/27
    PY  - 2017
    N1  - https://doi.org/10.11648/j.awcn.20170304.13
    DO  - 10.11648/j.awcn.20170304.13
    T2  - Advances in Wireless Communications and Networks
    JF  - Advances in Wireless Communications and Networks
    JO  - Advances in Wireless Communications and Networks
    SP  - 45
    EP  - 49
    PB  - Science Publishing Group
    SN  - 2575-596X
    UR  - https://doi.org/10.11648/j.awcn.20170304.13
    AB  - The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.
    VL  - 3
    IS  - 4
    ER  - 

    Copy | Download

Author Information
  • Department of Information Management Technology, School of Management Technology, Federal University of Technology Owerri, Owerri, Nigeria

  • Department of Information Management Technology, School of Management Technology, Federal University of Technology Owerri, Owerri, Nigeria

  • Department of Information Management Technology, School of Management Technology, Federal University of Technology Owerri, Owerri, Nigeria

  • Sections