Game Theory Basics and Its Application in Cyber Security

The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.

[1]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[3]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[4]  Paul F. Syverson,et al.  A different look at secure distributed computation , 1997, Proceedings 10th Computer Security Foundations Workshop.

[5]  G. Manimaran,et al.  Internet infrastructure security: a taxonomy , 2002, IEEE Netw..

[6]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[7]  M. Sridharan,et al.  ESSENTIALS OF GAME THEORY , 2007 .

[8]  Assane Gueye,et al.  A Game Theoretical Approach to Communication Security , 2011 .

[9]  Samuel N. Hamilton,et al.  Challenges in Applying Game Theory to the Domain of Information Warfare , 2001 .

[10]  Maryam Mohi,et al.  A Game Theory Based Approach for Security in Wireless Sensor Networks , 2008 .

[11]  S. Stubberud,et al.  FRIARS: a feedback control system for information assurance using a Markov decision process , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Chris Hankin,et al.  Game Theory Meets Information Security Management , 2014, SEC.

[14]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[15]  Joao P. Hespanha,et al.  Preliminary results in routing games , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).

[16]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[17]  Hua Li,et al.  Distributed Intrusion Detection System Based on BP Neural Network , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[18]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).