A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators).

[1]  J. W. Herrmann,et al.  Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures , 2012 .

[2]  Svein J. Knapskog,et al.  Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).

[3]  Rahul Khanna,et al.  Distributed and Control Theoretic Approach to Intrusion Detection , 2022 .

[4]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.

[5]  Karin Sallhammar,et al.  Stochastic Models for Combined Security and Dependability Evaluation , 2007 .

[6]  Karin Sallhammar,et al.  Using Game Theory in Stochastic Models for Quantifying Security , 2004 .

[7]  Huseyin Cavusoglu,et al.  Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..

[8]  Chuang Lin,et al.  Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets , 2013, Secur. Commun. Networks.

[9]  S. O. Falaki,et al.  NETWORK INTRUSION DETECTION BASED ON ROUGH SET AND K-NEAREST NEIGHBOUR , 2008 .

[10]  Nageswara S. V. Rao,et al.  Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures , 2012 .

[11]  Markus Schumacher,et al.  Collaborative attack modeling , 2002, SAC '02.

[12]  Ryan Trost Practical Intrusion Analysis: Prevention and Detection for the Twenty-first Century , 2009 .

[13]  Tansu Alpcan,et al.  Network Security , 2010 .

[14]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[15]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[16]  Panda Mrutyunjaya,et al.  A Data Mining Approach to Network Intrusion Detection , 2015 .

[17]  Assane Gueye,et al.  A Game Theoretical Approach to Communication Security , 2011 .

[18]  Rong Yang,et al.  Designing better strategies against human adversaries in network security games , 2012, AAMAS.