A Survey of Game Theoretic Methods for Cyber Security

Cyber security has been heavily studied in both industry and academia, but the traditional security technology is still facing unprecedented challenges in the background of massive and complicated network traffic. Game theory as a mathematical model of conflict and cooperation between intelligent rational decision-makers has great potential to improve cyber security. This paper describes a focused literature survey of game theoretic methods for cyber security applications. The methods are classified according to their security application scenarios, and we also present their advantages and limitations respectively. Then we discuss the difficulties and challenges confronting researchers, and in addition, we propose some directions for further research on game theory as applied to cyber security from both the mathematics perspective and security perspective.

[1]  R. Gibbons Game theory for applied economists , 1992 .

[2]  Mohsen Guizani,et al.  Game theoretic data privacy preservation: Equilibrium and pricing , 2015, 2015 IEEE International Conference on Communications (ICC).

[3]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[4]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[5]  Yoon-Ho Choi,et al.  A game theoretic model for dynamic configuration of large-scale intrusion detection signatures , 2016, Multimedia Tools and Applications.

[6]  Ming Zhao,et al.  Game Theoretic Modeling of Security and Interdependency in a Public Cloud , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[7]  Mehran S. Fallah A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory , 2010, IEEE Transactions on Dependable and Secure Computing.

[8]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[9]  Quanyan Zhu,et al.  GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.

[10]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[11]  Ibrahim Sogukpinar,et al.  Scalable risk assessment method for cloud computing using game theory (CCRAM) , 2015, Comput. Stand. Interfaces.

[12]  Asuman E. Ozdaglar,et al.  Network Games: Theory, Models, and Dynamics , 2011, Network Games: Theory, Models, and Dynamics.

[13]  Issa Traoré,et al.  A Game Theoretic Framework for Cloud Security Transparency , 2015, NSS.

[14]  V. Chepyzhov,et al.  Attractors for Equations of Mathematical Physics , 2001 .

[15]  Jing Chen,et al.  Game-theory-based batch identification of invalid signatures in wireless mobile networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[16]  Lang Tong,et al.  A Game-Theoretic Approach to Anonymous Networking , 2012, IEEE/ACM Transactions on Networking.

[17]  Paul W. Goldberg,et al.  The complexity of computing a Nash equilibrium , 2006, STOC '06.

[18]  Chunming Qiao,et al.  Optimal resource allocation to defend against deliberate attacks in networking infrastructures , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[20]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[21]  William H. Sanders,et al.  Ieee Transactions on Parallel and Distributed Systems Rre: a Game-theoretic Intrusion Response and Recovery Engine , 2022 .

[22]  Jean C. Walrand,et al.  How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.

[23]  Tamer Başar,et al.  A game-theoretic view on the physical layer security of cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[24]  Tansu Alpcan,et al.  Network Security , 2010 .

[25]  Andrew P. Martin,et al.  Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[26]  Koushik Majumder,et al.  A Game Theoretic Model to Detect Cooperative Intrusion Over Multiple Packets , 2016 .

[27]  Sayan Paul,et al.  Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems , 2016 .

[28]  Guanhua Yan,et al.  Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.

[29]  Marc Lelarge,et al.  Coordination in Network Security Games: A Monotone Comparative Statics Approach , 2012, IEEE Journal on Selected Areas in Communications.

[30]  Quanyan Zhu,et al.  Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.