Game Theory Basics and Its Application in Cyber Security
Advances in Wireless Communications and Networks
Volume 3, Issue 4, July 2017, Pages: 45-49
Received: May 25, 2017; Accepted: Jul. 4, 2017; Published: Jul. 27, 2017
Views 1623      Downloads 142
Authors
Amadi Emmanuuel Chukwudi, Department of Information Management Technology, School of Management Technology, Federal University of Technology Owerri, Owerri, Nigeria
Eze Udoka, Department of Information Management Technology, School of Management Technology, Federal University of Technology Owerri, Owerri, Nigeria
Ikerionwu Charles, Department of Information Management Technology, School of Management Technology, Federal University of Technology Owerri, Owerri, Nigeria
Article Tools
Follow on us
Abstract
The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.
Keywords
Game Theory, Cyber Security, Security Games, Players
To cite this article
Amadi Emmanuuel Chukwudi, Eze Udoka, Ikerionwu Charles, Game Theory Basics and Its Application in Cyber Security, Advances in Wireless Communications and Networks. Vol. 3, No. 4, 2017, pp. 45-49. doi: 10.11648/j.awcn.20170304.13
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
M. J. Osborne, “An Introduction to Game Theory by Please send comments to Department of Economics This version ,” 2000.
[2]
A. Fielder, E. Panaousis, P. Malacaria, C. Hankin, and F. Smeraldi, “Game Theory Meets Information Security Management,” in Information Security and Privacy Conference, 2014, 2014, pp. 15–29.
[3]
K. Lye and J. Wing, “Game Strategies in Network Security,” Copenhagen, Denmark, 2002.
[4]
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A survey of game theory as applied to network security,” Syst. Sci. (HICSS), 2010 43rd Hawaii Int. Conf., pp. 1–10, 2010.
[5]
John. F. Nash, “Equilibrium Points in n-Person Games,” in Proceedings of the National Academy of Sciences of the United States of America, Published by : National Academy of Sciences, 2013, vol. 36, no. 1, pp. 48–49.
[6]
C. F. Camerer, T. Ho, and J. K. Chong, “Behavioural Game Theory: Thinking, Learning and Teaching ∗.”
[7]
A. Gueye, “A Game Theoretical Approach to Communication Security,” 2011.
[8]
K. Leyton-Brown and Y. Shoham, Essentials of game theory. Morgan & Claypool Publishers series, 2008.
[9]
S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, “Challenges in Applying Game Theory to the Domain of Information Warfare,” Proc. 4th Inf. Surviv. Work., 2002.
[10]
A. Chakrabarti and G. Manimaran, “Internet Infrastructure Security: A Taxonomy,” IEEE Netw., no. December, pp. 13–21, 2002.
[11]
J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39–53, 2004.
[12]
J. P. Hespanha and S. Bohacek, “Preliminary Results in Routing Games,” Am. Control Conf. 2001. Proc. 2001. IEEE, vol. 3, pp. 1904–1909, 2001.
[13]
J. McInerney, S. Stubberud, and S. Anwar, “Friars: a feedback control system for information assurance using a markov decision process,” Technol. 2001, 2001.
[14]
P. F. Syverson, “A different look at secure distributed computation,” in Proceedings 10th Computer Security Foundations Workshop, 1997, pp. 109–115.
[15]
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proc. 6th Annu., 2000.
[16]
Y. Liu, C. Comaniciu, and H. Man, “Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection,” Int. J. Secur. Networks, vol. 1, no. 3/4, p. 243, 2006.
[17]
Z. Shuang-can, H. Chen-jun, and W. Zhang, “Distributed intrusion detection system based on BP neural network,” Int. J. Secur. its Appl., vol. 8, no. 2, pp. 183–192, 2009.
[18]
M. Kodialam and T. V Lakshman, “Detecting Network Intrusions via Sampling: A Game Theoretic Approach,” Infocom, vol. 0, no. C, 2003.
[19]
A. Agah, S. K. Das, and K. Basu, “A game theory based approach for security in wireless sensor networks,” in IEEE International Conference on Performance, Computing, and Communications, 2004, 2004, pp. 259–263.
[20]
T. Alpcan and T. Basar, “A game theoretic approach to decision and analysis in network intrusion detection,” in 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), 2003, vol. 3, pp. 2595–2600.
[21]
Syverson, P. F, "A different look at secure distributed computation". In Proceedings 10th Computer Security Foundations Workshop, IEEE Comput. Soc. Press. http://doi.org/10.1109/CSFW.1997.59679, 1997, pp. 109–115.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186