skip to main content
research-article

Game theory meets network security and privacy

Published:03 July 2013Publication History
Skip Abstract Section

Abstract

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

References

  1. Abraham, I., Dolev, D., Gonen, R., and Halpern, J. 2006. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In Proceedings of the 25th ACM Annual Symposium on Principles of Distributed Computing (PODC). 53--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Abraham, I., Dolev, D., and Halpern, J. 2008. Lower bounds on implementing robust and resilient mediators. In Proceedings of the Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, Springer, 302--319. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Acquisti, A. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce (EC). 21--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Acquisti, A., Dingledine, R., and Syverson, P. 2003. On the economics of anonymity. In Proceedings of the Financial Cryptography (FC), Lecture Notes in Computer Science, vol. 2742, Springer, 84--102.Google ScholarGoogle Scholar
  5. Afanasyev, M., Chen, T., Voelker, G., and Snoeren, A. 2008. Analysis of a mixed-use urban WiFi network: When metropolitan becomes neapolitan. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement. 85--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alpcan, T. and Başar, T. 2003. A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control (CDC).Google ScholarGoogle Scholar
  7. Alpcan, T. and Başar, T. 2004. A game theoretic analysis of intrusion detection in access control systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC).Google ScholarGoogle Scholar
  8. Alpcan, T. and Başar, T. 2006. An intrusion detection game with limited observations. In Proceedings of the 12th International Symposium on Dynamic Games and Applications.Google ScholarGoogle Scholar
  9. Alpcan, T. and Başar, T. 2011. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Altman, E., Avrachenkov, K., and Garnaev, A. 2009. Jamming in wireless networks: The case of several jammers. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Anderson, R. and Moore, T. 2006. The economics of information security. Science 314, 5799, 610.Google ScholarGoogle ScholarCross RefCross Ref
  12. Apt, K. and Witzel, A. 2006. A generic approach to coalition formation. In Proceedings of the International Workshop on Computational Social Choice (COMSOC).Google ScholarGoogle Scholar
  13. Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M., and Knapskog, S. 2006. Real-time risk assessment with network sensors and intrusion detection systems. In Proceedings of the Computational Intelligence and Security, Lecture Notes in Computer Science, vol. 3802, Springer, 388--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. August, T. and Tunca, T. 2006. Network software security and user incentives. Manage. Sci. 52, 11 (November), 1703--1720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Başar, T. 1983. The Gaussian test channel with an intelligent jammer. IEEE Trans. Inform. Theory 29, 1, 152--157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Başar, T. and Olsder, G. J. 1999. Dynamic Noncooperative Game Theory 2nd ed. SIAM, Philadelphia, PA.Google ScholarGoogle Scholar
  17. Bilogrevic, I., Manshaei, M. H., Raya, M., and Hubaux, J.-P. 2010. Optimal revocations in ephemeral networks: a game-theoretic framework. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).Google ScholarGoogle Scholar
  18. Bohme, R. and Moore, T. 2009. The iterated weakest link: A model of adaptive security investment. In Proceedings of the Workshop on the Economics of Information Security (WEIS).Google ScholarGoogle Scholar
  19. Bohme, R. and Schwartz, G. 2010. Modeling cyber-insurance: Towards a unifying framework. In Proceedings of the Workshop on the Economics of Information Security (WEIS).Google ScholarGoogle Scholar
  20. Bolot, J. and Lelarge, M. 2008. Cyber insurance as an incentive for internet security. In Proceedings of the Workshop on Economics of Information Security (WEIS).Google ScholarGoogle Scholar
  21. Borden, J. M., Mason, D. M., and McEliece, R. J. 1985. Some information theoretic saddlepoints. SIAM J. Control Optim. 23, 1, 129--143.Google ScholarGoogle ScholarCross RefCross Ref
  22. Boutaba, R. and Aib, I. 2007. Policy-based management: A historical perspective. J. Netw. Syst. Manage. 15, 4, 447--480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Braun, C. and Schifferle, S. 2005. BlueDating - dating application for Bluetooth enabled mobile phones. Tech. rep. ETH Zurich, Switzerland, TIK-SA-2005.08.Google ScholarGoogle Scholar
  24. Bretscher, K. 2005. BlueLocation. Tech. rep. ETH Zurich, Switzerland, TIK-SA-2005-17.Google ScholarGoogle Scholar
  25. Bro. 2010. Bro intrusion detection system users manual. http://www.bro-ids.org.Google ScholarGoogle Scholar
  26. Buchegger, S. and Alpcan, T. 2008. Security games for vehicular networks. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing. 244--251.Google ScholarGoogle Scholar
  27. Buttyan, L. and Hubaux, J.-P. 2008. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, Cambridge, U.K. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Duma, C., Karresand, M. N. S., and Caronni, G. 2006. A trustaware p2p-based overlay for intrusion detection. In Proceedings of the International Conference on Database and Expert Systems Applications Workshops. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Camp, L. J. 2006. Economics of information security. http://ssrn.com/abstract=889442.Google ScholarGoogle Scholar
  30. Campos, L. 1989. Fuzzy linear programming models to solve fuzzy matrix games. Fuzzy Sets Syst. 32, 3, 275--289. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Cavusoglu, H., Cavusoglu, H., and Raghunathan, S. 2008. Security patch management: Share the burden or share the damage. Manage. Sci. 54, 4 (April), 657--670. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Chan, H., Gligor, V. D., Perrig, A., and Muralidharan, G. 2005. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. Depend. Secure Comput. 2, 3, 233--247. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Chen, L. and Leneutre, J. 2009. A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inform. Forensics Secur. 4, 2, 165--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Chen, R., Park, J., and Reed, J. 2008. Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Select. Areas Commun. 26, 1, 25--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Csiszar, I. and Korner, J. 1978. Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 54, 2470--2492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Debar, H., Dacier, M., and Wespi, A. 2005. Towards a taxonomy of intrusion detection systems. Comput. Netw. 31, 8, 805--822. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Dodis, Y., Halevi, S., and Rabin, T. 2000. A cryptographic solution to a game theoretic problem. In Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, Springer, 112--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Dodis, Y. and Rabin, T. 2007. Cryptography and game theory. In Proceedings of the Algorithmic Game Theory, Cambridge University Press, Cambridge, U.K., 181--209.Google ScholarGoogle Scholar
  40. Douceur, J. 2002. The Sybil Attack. In Proceedings of the Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, 251--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Ephremides, A. and Wieselthier, J. E. 1987. A design concept for reliable mobile radio networks with frequency hopping signaling. Proc. IEEE 75, 56--73.Google ScholarGoogle ScholarCross RefCross Ref
  42. Fall, K. 2003. A delay-tolerant network architecture for challenged internets. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 27--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Freudiger, J., Manshaei, M. H., Hubaux, J.-P., and Parkes, D. C. 2009. On non-cooperative location privacy: A game-theoretic analysis. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Fudenberg, D. and Tirole, J. 1991. Game Theory. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  45. Fung, C., Baysal, O., Zhang, J., Aib, I., and Boutaba, R. 2008. Trust management for host-based collaborative intrusion detection. In Proceedings of the 19th IFIP/IEEE International Workshop on Distributed Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Fung, C., Zhang, J., Aib, I., and Boutaba, R. 2009. Robust and scalable trust management for collaborative intrusion detection. In Proceedings of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Garagic, D. and Cruz, J. 2003. An approach to fuzzy noncooperative Nash games. J. Optim. Theory Appl. 118, 3, 475--491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Gibbons, R. 1992. A Primer in Game Theory. Prentice Hall, Upper Saddle River, NJ.Google ScholarGoogle Scholar
  49. Goldreich, O., Micali, S., and Wigderson, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing. 218--229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Gordon, S. and Katz, J. 2006. Rational secret sharing, revisited. In Proceedings of the Security and Cryptography for Networks, Lecture Notes in Computer Science, vol. 4116, Springer, 229--241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Grossklags, J., Christin, N., and Chuang, J. 2008. Secure or insure?: A game-theoretic analysis of information security games. In Proceedings of the 17th ACM International Conference on World Wide Web (WWW). 209--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Grossklags, J. and Johnson, B. 2009. Uncertainty in the weakest-link security game. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). 673--682. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Halpern, J. and Teague, V. 2004. Rational secret sharing and multiparty computation. In Proceedings of the 36th Annual ACM Symposium on Theory of Computing. 632. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Han, Z., Marina, N., Debbah, M., and Hjørungnes, A. 2009. Physical layer security game: How to date a girl with her boyfriend on the same table. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Hatt, N. 2005. BlueFramework - Application framework for Bluetooth enabled mobile phones. Tech. rep. ETH Zurich, Switzerland, TIK-MA-2005-16.Google ScholarGoogle Scholar
  56. Haykin, S. 2005. Cognitive radio: Brain-empowered wireless communications. IEEE J. Select. Areas Commun. (JSAC) 23, 2 (February). Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Hossain, E., Niyato, D., and Han, Z. 2009. Dynamic spectrum access and Management in cognitive radio networks. Cambridge University Press, Cambridge, U.K. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Hui, K. L. and Png, I. 2006. The Economics of Privacy. In Handbook of Information systems and Economics, Elsevier, 471.Google ScholarGoogle Scholar
  59. Humbert, M., Manshaei, M. H., Freudiger, J., and Hubaux, J.-P. 2010. Tracking games in mobile networks. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes in Computer Science, vol. 6442, Springer, 38--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Kantarcioglu, M., Bensoussan, A., and Hoe, C. 2010. When do firms invest in privacy-preserving technologies? In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes Computer Science, vol. 6442, Springer, 72--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Kashyap, A., Başar, T., and Srikant, R. 2004. Correlated jamming on MIMO Gaussian fading channels. IEEE Trans. Inform. Theory 50, 9, 2119--2123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Katz, J. 2008. Bridging game theory and cryptography: Recent results and future directions. In Proceedings of the Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, 251--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Keppler, J. and Mountford, H. 1999. Handbook of Incentive Measures for Biodiversity: Design and Implementation. Organisation for Economic Co-operation and Development (OECD), Paris.Google ScholarGoogle Scholar
  64. Kol, G. and Naor, M. 2008. Cryptography and game theory: Designing protocols for exchanging information. In Proceedings of the 5th Conference on Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, Springer, 320--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Krishna, V. 2002. Auction Theory 1st Ed. Academic Press, waltham, MA.Google ScholarGoogle Scholar
  66. Kunreuther, H. and Heal, G. 2003. Interdependent security. J. Risk Uncertainty 26, 2 (March), 231--249.Google ScholarGoogle ScholarCross RefCross Ref
  67. Lelarge, M. and Bolot, J. 2008. A local mean field analysis of security investments in networks. In Proceedings of the 3rd ACM International Workshop on Economics of Networked Systems (NetECON). Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Leung-Yan-Cheong, S. K. and Hellman, M. E. 1978. The Gaussian wiretap channel. IEEE Trans. Inform. Theory 24, 451--456. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Liu, P., Zang, W., and Yu, M. 2005. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inform. Syst. Secur. 8, 1, 78--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Liu, Y., Comaniciu, C., and Man, H. 2006. A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of the Workshop on Game Theory for Communications and Networks (GameNets). Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Lye, K. and Wing, J. M. 2002. Game strategies in network security. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW).Google ScholarGoogle Scholar
  72. Lysyanskaya, A. and Triandopoulos, N. 2006. Rationality and adversarial behavior in multi-party computation. In Proceedings of the Advances in Cryptology—CRYPTO 2006, Lecture Notes in Computer Science, vol. 4117, Springer, 180--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Ma, R., Lee, S., Lui, J., and Yau, D. 2004. A game theoretic approach to provide incentive and service differentiation in P2P networks. ACM SIGMETRICS Perform. Eval. Rev. 32, 1, 189--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Mallik, R., Scholtz, R., and Papavassilopoulos, G. 2000. Analysis of an on-off jamming situation as a dynamic game. IEEE Trans. Commun. 48, 8 (August), 1360--1373.Google ScholarGoogle ScholarCross RefCross Ref
  75. Medard, M. 1997. Capacity of correlated jamming channels. In Proceedings of the 35th Allerton Conference on Communication, Control, and Computing. 1043--1052.Google ScholarGoogle Scholar
  76. Micali, S. and Valiant, P. 2008. Revenue in truly combinatorial auctions and adversarial mechanism design. Tech. rep. MIT, Cambridge, MA, MIT-CSAIL-TR-2008-039.Google ScholarGoogle Scholar
  77. Michiardi, P. and Molva, R. 2002. Game theoretic analysis of security in mobile ad hoc networks. Research Report RR-02-070, Institut Eurecom, Sophia-Antipolis.Google ScholarGoogle Scholar
  78. Miura-Ko, A., Yolken, B., Bambos, N., and Mitchell, J. 2008a. Security investment games of interdependent organizations. In Proceedings of the Allerton Conference on Communication, Control, and Computing.Google ScholarGoogle Scholar
  79. Miura-Ko, R., Yolken, B., Mitchell, J., and Bambos, N. 2008b. Security decision-making among interdependent organizations. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF). 66--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Moore, T., Clulow, J., Nagaraja, S., and Anderson, R. 2007. New strategies for revocation in ad-hoc networks. In Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Mukherjee, A. and Swindlehurst, A. L. 2010. Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers. In Proceedings of the IEEE International Conference on Communications (ICC).Google ScholarGoogle Scholar
  82. Nash, J. 1951. Non-cooperative games. Ann. Math. 54, 2, 286--295.Google ScholarGoogle ScholarCross RefCross Ref
  83. Nguyen, K., Alpcan, T., and Başar, T. 2008. Fictitious play with imperfect observations for network intrusion detection. In Proceedings of the 13th International Symposium Dynamic Games and Applications.Google ScholarGoogle Scholar
  84. Nguyen, K. C., Alpcan, T., and Başar, T. 2009. Stochastic games for security in networks with interdependent nodes. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Nisan, N., Ed. 2007. Introduction to mechanism design (for computer scientists). In Proceedings of the Algorithmic Game Theory, Cambridge University Press, Cambridge, U.K., 209--242.Google ScholarGoogle ScholarCross RefCross Ref
  86. Nisan, N. and Ronen, A. 1999. Algorithmic mechanism design. In Proceedings of the 31 Annual ACM Symposium on Theory of Computing. 129--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Odlyzko, A. 2003. Privacy, economics, and price discrimination on the Internet. In Proceedings of the 5th ACM International Conference on Electronic Commerce (EC). 355--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Raghavan, T. E. S. and Filar, J. A. 1991. Algorithms for stochastic games -- a survey. Math. Methods Opera. Res. 35, 437--472.Google ScholarGoogle ScholarCross RefCross Ref
  89. Raya, M. and Hubaux, J.-P. 2005. The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks. 21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Raya, M., Manshaei, M. H., Felegyhazi, M., and Hubaux, J.-P. 2008. Revocation games in ephemeral networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Raya, M., Shokri, R., and Hubaux, J.-P. 2010. On the tradeoff between trust and privacy in wireless ad hoc networks. In Proceedings of the ACM Conference on Wireless Network Security (WiSec). Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Rehák, M., Pěchouček, M., and Tožička, J. 2005. Adversarial behavior in multi-agent systems. In Proceedings of the Multi-Agent Systems and Applications IV, Lecture Notes in Computer Science, vol. 3690, Springer, 470--479. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Reidt, S., Srivatsa, M., and Balfe, S. 2009. The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Saad, W., Han, Z., Başar, T., Debbah, M., and Hjørungnes, A. 2009. Physical layer security: Coalitional games for distributed cooperation. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Sagduyu, Y., Berry, R., and Ephremides, A. 2009. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). 130--139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Sallhammar, K., Helvik, B., and Knapskog, S. 2006. On stochastic modeling for integrated security and dependability evaluation. J. Netw. 1, 5, 31.Google ScholarGoogle Scholar
  97. Schaelicke, L., Slabach, T., Moore, B., and Freeland, C. 2003. Characterizing the performance of network intrusion detection sensors. In Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 2820, Springer, 155--172.Google ScholarGoogle Scholar
  98. Semret, N., Liao, R., Campbell, A., and Lazar, A. 2000. Peering and provisioning of differentiated internet services. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  99. Sen, P., Chaki, N., and Chaki, R. 2008. HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. In Proceedings of the Computer Information Systems and Industrial Management Applications (CISIM). 121--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. SnortTeam. 2010. Snort users manual. http://www.snort.org, 2.8.6 ed.Google ScholarGoogle Scholar
  101. Sommer, P. 2007. Design and analysis of realistic mobility model for wireless mesh networks. M.S. Thesis, ETH Zurich, Switzerland.Google ScholarGoogle Scholar
  102. Theodorakopoulos, G. and Baras, J. 2007. Malicious users in unstructured networks. In Proceedings of the 26th Annual IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  103. Varian, H. 2009. Economic aspects of personal privacy. In Internet Policy and Economics, Springer, 101--109.Google ScholarGoogle Scholar
  104. Vratonjic, N., Manshaei, M., Raya, M., and Hubaux, J.-P. 2010a. ISPs and ad networks against botnet ad fraud. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec). Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Vratonjic, N., Raya, M., Hubaux, J.-P., and Parkes, D. 2010b. Security games in online advertising: Can ads help secure the web? In Proceedings of the Workshop on the Economics of Information Security (WEIS).Google ScholarGoogle Scholar
  106. Wasserman, S. and Faust, K. 1994. Social Network Analysis: Methods and Applications. Cambridge Univiversity Press, Cambridge, U.K.Google ScholarGoogle Scholar
  107. Weibel, A. and Winterhalter, L. 2005. Bluetella: File sharing for bluetooth enabled mobile phones. M.S. Thesis, Swiss Federal Institute of Technology Zurich (ETHZ), Switzerland.Google ScholarGoogle Scholar
  108. Wu, Y., Foo, B., Mei, Y., and Bagchi, S. 2003. Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS. In Proceedings of the 19th Annual Computer Security Applications Conference. 234--244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Wyner, A. D. 1975. The wire-tap channel. Bell Syst. Tech. J.Google ScholarGoogle ScholarCross RefCross Ref
  110. Yan, Y., El-Atawy, A., and Al-Shaer, E. 2007. Ranking-based optimal resource allocation in peer-to-peer networks. In Proceedings of the 26th Annual IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  111. Yegneswaran, V., Barford, P., and Jha, S. 2004. Global intrusion detection in the DOMINO overlay system. In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  112. Yu, W. and Liu, K. J. R. 2007. Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mobile Comput. 6, 5, 459--473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. Zhang, N., Yu, W., Fu, X., and Das, S. K. 2010a. gPath: A game-theoretic path selection algorithm to protect Tor's anonymity. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes in Computer Science, vol. 6442, Springer, 58--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Zhang, N., Yu, W., Fu, X., and Das, S. K. 2010b. Maintaining defender's reputation in anomaly detection against insider attacks. IEEE Trans. Syst., Man, Cybernetics, Part B: Cybernetics 40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Zhou, C., Karunasekera, S., and Leckie, C. 2005. A peer-to-peer collaborative intrusion detection system. In Proceedings of the International Conference on Networks.Google ScholarGoogle Scholar
  116. Zhu, Q. and Başar, T. 2009. Dynamic policy-based IDS configuration. In Proceedings of the 47th IEEE Conference on Decision and Control (CDC).Google ScholarGoogle Scholar
  117. Zhu, Q. and Başar, T. 2011a. Indices of power in optimal IDS default configuration: Theory and examples. In Proceedings of the 2nd Conference on Decision and Game Theory (GameSec). Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Zhu, Q. and Başar, T. 2011b. Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference.Google ScholarGoogle Scholar
  119. Zhu, Q. and Başar, T. 2011c. Towards a unifying security framework for cyber-physical systems. In Proceedings of the Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11).Google ScholarGoogle Scholar
  120. Zhu, Q. and Başar, T. 2012. A Hierarchical Security Architecture for smart grid: From theory to practice. In Proceedings of the Smart Grid Communications and Networking, E. Hossain, Z. Han, and H. V. Poor, Eds., Cambridge University Press, Cambridge, U.K.Google ScholarGoogle Scholar
  121. Zhu, Q., Fung, C., Boutaba, R., and Başar, T. 2009. A game-theoretical approach to incentive design in collaborative intrusion detection networks. In Proceedings of the International Conference on Game Theory for Networks (GameNets). 384--392. Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Zhu, Q., Li, H., Han, Z., and Başar, T. 2010. A stochastic game model for jamming in multi-channel cognitive radio systems. In Proceedings of the IEEE International Conference on Communications (ICC).Google ScholarGoogle Scholar
  123. Zhu, Q., McQueen, M., Rieger, C., and Başar, T. 2011. Management of control system information security: Control system patch management. In Proceedings of the Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11).Google ScholarGoogle Scholar
  124. Zhu, Q., Saad, W., Han, Z., Poor, H. V., and Başar, T. 2011. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of the IEEE (MILCOM).Google ScholarGoogle Scholar
  125. Zhu, Q., Tembine, H., and Başar, T. 2010a. Heterogeneous learning in zero-sum stochastic games with incomplete information. In Proceedings of the IEEE Conference on Decisions and Control (CDC).Google ScholarGoogle Scholar
  126. Zhu, Q., Tembine, H., and Başar, T. 2010b. Network security configuration: A nonzero-sum stochastic game approach. In Proceedings of the American Control Conference (ACC).Google ScholarGoogle Scholar
  127. Zhu, Q., Tembine, H., and Başar, T. 2011. Distributed strategic learning with application to network security. In Proceedings of the American Control Conference (ACC).Google ScholarGoogle Scholar
  128. Zonouz, S. A., Khurana, H., Sanders, W. H., and Yardley, T. M. 2009. RRE: A game-theoretic intrusion response and recovery engine. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN).Google ScholarGoogle Scholar

Index Terms

  1. Game theory meets network security and privacy

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 45, Issue 3
          June 2013
          575 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/2480741
          Issue’s Table of Contents

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 July 2013
          • Accepted: 1 October 2011
          • Revised: 1 March 2011
          • Received: 1 September 2010
          Published in csur Volume 45, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader