Game Theory and Information Security

Article Preview

Abstract:

The interactions between attackers and network administrator are modeled as a non-zero-sum dynamic game with incomplete information. Strategies taken by offenders and defenders are dynamic game processes which are mutually dependable and constantly repeated. This paper uses game theory to analyze the model and process of offense and defense counterwork, and suggests that information security problems can be studied from game theory's point of view.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1625-1630

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Samuel N Hamilton, WendyLMiller, and Allen Ott, OSami Say-djari. The Role of Game Theory in Information Warfare. Proceedings of 4th Information Survivability Workshop, Vancouver, Canada, Washington, DC. USA: IEEE Computer Society Press, 2002: 45-46.

Google Scholar

[2] Syverson PE. A different look at secure distributed Computation [C]. In Proceedings of the 1997 IEEE Computer Security Foundations Workshop. CSFW, 1997, 10: 109-115.

DOI: 10.1109/csfw.1997.596797

Google Scholar

[3] Kong-wei, L. and M.W. Jeannette, Game strategies in network security. International Journal of Information Security, 2005. 4(1-2): p.71.

Google Scholar

[4] Wei Sun, Xiangwei Kong, Dequan He, Xingang You. Information Security Problem Research Based on Game Theory. Aug. 2008 Proceedings of the 2008 International Symposium on Electronic Commerce and Security.

DOI: 10.1109/isecs.2008.147

Google Scholar

[5] P. Liu and W. Zang. Incentive-Based Modeling and Inference of Attack Intent, Objectives, and Strategies. CCS '03, Washington, DC., (2003).

Google Scholar

[6] ZHU Jian-Ming, Srinivasan Raghunatha. Evaluation Model of Information Security Technologies Based on Game Theoretic. Chinese Journal of Computers. 2009(04): 828-834. (In Chinese).

DOI: 10.3724/sp.j.1016.2009.00828

Google Scholar

[7] Jia Chunful, Zhong Anmin, Zhang Wei, and Ma Yong. Incomplete Informational and Dynamic Game Model in Network Security. Journal of Computer Research and Development. 2006, 43(z2): 530-533. (In Chinese).

Google Scholar

[8] Liu, P., W. Zang, and M. Yu. Incentive-based modeling and inference of attacker intent, objectives, and strategies ACM Press 1515 Broadway, 17th Floor New York, NY USA, 2005: p.78 – 118.

DOI: 10.1145/1053283.1053288

Google Scholar

[9] CAO Hui, WANG Qing-qing, MA Yi-zhong, LUO Ping. Attack prediction model based on dynamic bayesian games. Journal of Computer Applications. 2007(06): 1545-1547. (In Chinese).

Google Scholar

[10] Yi Luo, F.S., Youssif Al-Nashif, Salim Hariri. Game theory based network security. Journal of Information Security, 2010. 1(1): p.41.

DOI: 10.4236/jis.2010.11005

Google Scholar