Abstract
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.
- Abraham, I., Dolev, D., Gonen, R., and Halpern, J. 2006. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In Proceedings of the 25th ACM Annual Symposium on Principles of Distributed Computing (PODC). 53--62. Google ScholarDigital Library
- Abraham, I., Dolev, D., and Halpern, J. 2008. Lower bounds on implementing robust and resilient mediators. In Proceedings of the Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, Springer, 302--319. Google ScholarDigital Library
- Acquisti, A. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce (EC). 21--29. Google ScholarDigital Library
- Acquisti, A., Dingledine, R., and Syverson, P. 2003. On the economics of anonymity. In Proceedings of the Financial Cryptography (FC), Lecture Notes in Computer Science, vol. 2742, Springer, 84--102.Google Scholar
- Afanasyev, M., Chen, T., Voelker, G., and Snoeren, A. 2008. Analysis of a mixed-use urban WiFi network: When metropolitan becomes neapolitan. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement. 85--98. Google ScholarDigital Library
- Alpcan, T. and Başar, T. 2003. A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control (CDC).Google Scholar
- Alpcan, T. and Başar, T. 2004. A game theoretic analysis of intrusion detection in access control systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC).Google Scholar
- Alpcan, T. and Başar, T. 2006. An intrusion detection game with limited observations. In Proceedings of the 12th International Symposium on Dynamic Games and Applications.Google Scholar
- Alpcan, T. and Başar, T. 2011. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press. Google ScholarDigital Library
- Altman, E., Avrachenkov, K., and Garnaev, A. 2009. Jamming in wireless networks: The case of several jammers. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). Google ScholarDigital Library
- Anderson, R. and Moore, T. 2006. The economics of information security. Science 314, 5799, 610.Google ScholarCross Ref
- Apt, K. and Witzel, A. 2006. A generic approach to coalition formation. In Proceedings of the International Workshop on Computational Social Choice (COMSOC).Google Scholar
- Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M., and Knapskog, S. 2006. Real-time risk assessment with network sensors and intrusion detection systems. In Proceedings of the Computational Intelligence and Security, Lecture Notes in Computer Science, vol. 3802, Springer, 388--397. Google ScholarDigital Library
- August, T. and Tunca, T. 2006. Network software security and user incentives. Manage. Sci. 52, 11 (November), 1703--1720. Google ScholarDigital Library
- Başar, T. 1983. The Gaussian test channel with an intelligent jammer. IEEE Trans. Inform. Theory 29, 1, 152--157. Google ScholarDigital Library
- Başar, T. and Olsder, G. J. 1999. Dynamic Noncooperative Game Theory 2nd ed. SIAM, Philadelphia, PA.Google Scholar
- Bilogrevic, I., Manshaei, M. H., Raya, M., and Hubaux, J.-P. 2010. Optimal revocations in ephemeral networks: a game-theoretic framework. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).Google Scholar
- Bohme, R. and Moore, T. 2009. The iterated weakest link: A model of adaptive security investment. In Proceedings of the Workshop on the Economics of Information Security (WEIS).Google Scholar
- Bohme, R. and Schwartz, G. 2010. Modeling cyber-insurance: Towards a unifying framework. In Proceedings of the Workshop on the Economics of Information Security (WEIS).Google Scholar
- Bolot, J. and Lelarge, M. 2008. Cyber insurance as an incentive for internet security. In Proceedings of the Workshop on Economics of Information Security (WEIS).Google Scholar
- Borden, J. M., Mason, D. M., and McEliece, R. J. 1985. Some information theoretic saddlepoints. SIAM J. Control Optim. 23, 1, 129--143.Google ScholarCross Ref
- Boutaba, R. and Aib, I. 2007. Policy-based management: A historical perspective. J. Netw. Syst. Manage. 15, 4, 447--480. Google ScholarDigital Library
- Braun, C. and Schifferle, S. 2005. BlueDating - dating application for Bluetooth enabled mobile phones. Tech. rep. ETH Zurich, Switzerland, TIK-SA-2005.08.Google Scholar
- Bretscher, K. 2005. BlueLocation. Tech. rep. ETH Zurich, Switzerland, TIK-SA-2005-17.Google Scholar
- Bro. 2010. Bro intrusion detection system users manual. http://www.bro-ids.org.Google Scholar
- Buchegger, S. and Alpcan, T. 2008. Security games for vehicular networks. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing. 244--251.Google Scholar
- Buttyan, L. and Hubaux, J.-P. 2008. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, Cambridge, U.K. Google ScholarDigital Library
- Duma, C., Karresand, M. N. S., and Caronni, G. 2006. A trustaware p2p-based overlay for intrusion detection. In Proceedings of the International Conference on Database and Expert Systems Applications Workshops. Google ScholarDigital Library
- Camp, L. J. 2006. Economics of information security. http://ssrn.com/abstract=889442.Google Scholar
- Campos, L. 1989. Fuzzy linear programming models to solve fuzzy matrix games. Fuzzy Sets Syst. 32, 3, 275--289. Google ScholarDigital Library
- Cavusoglu, H., Cavusoglu, H., and Raghunathan, S. 2008. Security patch management: Share the burden or share the damage. Manage. Sci. 54, 4 (April), 657--670. Google ScholarDigital Library
- Chan, H., Gligor, V. D., Perrig, A., and Muralidharan, G. 2005. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. Depend. Secure Comput. 2, 3, 233--247. Google ScholarDigital Library
- Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2. Google ScholarDigital Library
- Chen, L. and Leneutre, J. 2009. A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inform. Forensics Secur. 4, 2, 165--178. Google ScholarDigital Library
- Chen, R., Park, J., and Reed, J. 2008. Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Select. Areas Commun. 26, 1, 25--37. Google ScholarDigital Library
- Csiszar, I. and Korner, J. 1978. Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 54, 2470--2492. Google ScholarDigital Library
- Debar, H., Dacier, M., and Wespi, A. 2005. Towards a taxonomy of intrusion detection systems. Comput. Netw. 31, 8, 805--822. Google ScholarDigital Library
- Dodis, Y., Halevi, S., and Rabin, T. 2000. A cryptographic solution to a game theoretic problem. In Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, Springer, 112--130. Google ScholarDigital Library
- Dodis, Y. and Rabin, T. 2007. Cryptography and game theory. In Proceedings of the Algorithmic Game Theory, Cambridge University Press, Cambridge, U.K., 181--209.Google Scholar
- Douceur, J. 2002. The Sybil Attack. In Proceedings of the Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, 251--260. Google ScholarDigital Library
- Ephremides, A. and Wieselthier, J. E. 1987. A design concept for reliable mobile radio networks with frequency hopping signaling. Proc. IEEE 75, 56--73.Google ScholarCross Ref
- Fall, K. 2003. A delay-tolerant network architecture for challenged internets. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 27--34. Google ScholarDigital Library
- Freudiger, J., Manshaei, M. H., Hubaux, J.-P., and Parkes, D. C. 2009. On non-cooperative location privacy: A game-theoretic analysis. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Google ScholarDigital Library
- Fudenberg, D. and Tirole, J. 1991. Game Theory. MIT Press, Cambridge, MA.Google Scholar
- Fung, C., Baysal, O., Zhang, J., Aib, I., and Boutaba, R. 2008. Trust management for host-based collaborative intrusion detection. In Proceedings of the 19th IFIP/IEEE International Workshop on Distributed Systems. Google ScholarDigital Library
- Fung, C., Zhang, J., Aib, I., and Boutaba, R. 2009. Robust and scalable trust management for collaborative intrusion detection. In Proceedings of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM). Google ScholarDigital Library
- Garagic, D. and Cruz, J. 2003. An approach to fuzzy noncooperative Nash games. J. Optim. Theory Appl. 118, 3, 475--491.Google ScholarDigital Library
- Gibbons, R. 1992. A Primer in Game Theory. Prentice Hall, Upper Saddle River, NJ.Google Scholar
- Goldreich, O., Micali, S., and Wigderson, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing. 218--229. Google ScholarDigital Library
- Gordon, S. and Katz, J. 2006. Rational secret sharing, revisited. In Proceedings of the Security and Cryptography for Networks, Lecture Notes in Computer Science, vol. 4116, Springer, 229--241. Google ScholarDigital Library
- Grossklags, J., Christin, N., and Chuang, J. 2008. Secure or insure?: A game-theoretic analysis of information security games. In Proceedings of the 17th ACM International Conference on World Wide Web (WWW). 209--218. Google ScholarDigital Library
- Grossklags, J. and Johnson, B. 2009. Uncertainty in the weakest-link security game. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). 673--682. Google ScholarDigital Library
- Halpern, J. and Teague, V. 2004. Rational secret sharing and multiparty computation. In Proceedings of the 36th Annual ACM Symposium on Theory of Computing. 632. Google ScholarDigital Library
- Han, Z., Marina, N., Debbah, M., and Hjørungnes, A. 2009. Physical layer security game: How to date a girl with her boyfriend on the same table. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). Google ScholarDigital Library
- Hatt, N. 2005. BlueFramework - Application framework for Bluetooth enabled mobile phones. Tech. rep. ETH Zurich, Switzerland, TIK-MA-2005-16.Google Scholar
- Haykin, S. 2005. Cognitive radio: Brain-empowered wireless communications. IEEE J. Select. Areas Commun. (JSAC) 23, 2 (February). Google ScholarDigital Library
- Hossain, E., Niyato, D., and Han, Z. 2009. Dynamic spectrum access and Management in cognitive radio networks. Cambridge University Press, Cambridge, U.K. Google ScholarDigital Library
- Hui, K. L. and Png, I. 2006. The Economics of Privacy. In Handbook of Information systems and Economics, Elsevier, 471.Google Scholar
- Humbert, M., Manshaei, M. H., Freudiger, J., and Hubaux, J.-P. 2010. Tracking games in mobile networks. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes in Computer Science, vol. 6442, Springer, 38--57. Google ScholarDigital Library
- Kantarcioglu, M., Bensoussan, A., and Hoe, C. 2010. When do firms invest in privacy-preserving technologies? In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes Computer Science, vol. 6442, Springer, 72--86. Google ScholarDigital Library
- Kashyap, A., Başar, T., and Srikant, R. 2004. Correlated jamming on MIMO Gaussian fading channels. IEEE Trans. Inform. Theory 50, 9, 2119--2123. Google ScholarDigital Library
- Katz, J. 2008. Bridging game theory and cryptography: Recent results and future directions. In Proceedings of the Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, 251--272. Google ScholarDigital Library
- Keppler, J. and Mountford, H. 1999. Handbook of Incentive Measures for Biodiversity: Design and Implementation. Organisation for Economic Co-operation and Development (OECD), Paris.Google Scholar
- Kol, G. and Naor, M. 2008. Cryptography and game theory: Designing protocols for exchanging information. In Proceedings of the 5th Conference on Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, Springer, 320--339. Google ScholarDigital Library
- Krishna, V. 2002. Auction Theory 1st Ed. Academic Press, waltham, MA.Google Scholar
- Kunreuther, H. and Heal, G. 2003. Interdependent security. J. Risk Uncertainty 26, 2 (March), 231--249.Google ScholarCross Ref
- Lelarge, M. and Bolot, J. 2008. A local mean field analysis of security investments in networks. In Proceedings of the 3rd ACM International Workshop on Economics of Networked Systems (NetECON). Google ScholarDigital Library
- Leung-Yan-Cheong, S. K. and Hellman, M. E. 1978. The Gaussian wiretap channel. IEEE Trans. Inform. Theory 24, 451--456. Google ScholarDigital Library
- Liu, P., Zang, W., and Yu, M. 2005. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inform. Syst. Secur. 8, 1, 78--118. Google ScholarDigital Library
- Liu, Y., Comaniciu, C., and Man, H. 2006. A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of the Workshop on Game Theory for Communications and Networks (GameNets). Google ScholarDigital Library
- Lye, K. and Wing, J. M. 2002. Game strategies in network security. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW).Google Scholar
- Lysyanskaya, A. and Triandopoulos, N. 2006. Rationality and adversarial behavior in multi-party computation. In Proceedings of the Advances in Cryptology—CRYPTO 2006, Lecture Notes in Computer Science, vol. 4117, Springer, 180--197. Google ScholarDigital Library
- Ma, R., Lee, S., Lui, J., and Yau, D. 2004. A game theoretic approach to provide incentive and service differentiation in P2P networks. ACM SIGMETRICS Perform. Eval. Rev. 32, 1, 189--198. Google ScholarDigital Library
- Mallik, R., Scholtz, R., and Papavassilopoulos, G. 2000. Analysis of an on-off jamming situation as a dynamic game. IEEE Trans. Commun. 48, 8 (August), 1360--1373.Google ScholarCross Ref
- Medard, M. 1997. Capacity of correlated jamming channels. In Proceedings of the 35th Allerton Conference on Communication, Control, and Computing. 1043--1052.Google Scholar
- Micali, S. and Valiant, P. 2008. Revenue in truly combinatorial auctions and adversarial mechanism design. Tech. rep. MIT, Cambridge, MA, MIT-CSAIL-TR-2008-039.Google Scholar
- Michiardi, P. and Molva, R. 2002. Game theoretic analysis of security in mobile ad hoc networks. Research Report RR-02-070, Institut Eurecom, Sophia-Antipolis.Google Scholar
- Miura-Ko, A., Yolken, B., Bambos, N., and Mitchell, J. 2008a. Security investment games of interdependent organizations. In Proceedings of the Allerton Conference on Communication, Control, and Computing.Google Scholar
- Miura-Ko, R., Yolken, B., Mitchell, J., and Bambos, N. 2008b. Security decision-making among interdependent organizations. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF). 66--80. Google ScholarDigital Library
- Moore, T., Clulow, J., Nagaraja, S., and Anderson, R. 2007. New strategies for revocation in ad-hoc networks. In Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS). Google ScholarDigital Library
- Mukherjee, A. and Swindlehurst, A. L. 2010. Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers. In Proceedings of the IEEE International Conference on Communications (ICC).Google Scholar
- Nash, J. 1951. Non-cooperative games. Ann. Math. 54, 2, 286--295.Google ScholarCross Ref
- Nguyen, K., Alpcan, T., and Başar, T. 2008. Fictitious play with imperfect observations for network intrusion detection. In Proceedings of the 13th International Symposium Dynamic Games and Applications.Google Scholar
- Nguyen, K. C., Alpcan, T., and Başar, T. 2009. Stochastic games for security in networks with interdependent nodes. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). Google ScholarDigital Library
- Nisan, N., Ed. 2007. Introduction to mechanism design (for computer scientists). In Proceedings of the Algorithmic Game Theory, Cambridge University Press, Cambridge, U.K., 209--242.Google ScholarCross Ref
- Nisan, N. and Ronen, A. 1999. Algorithmic mechanism design. In Proceedings of the 31 Annual ACM Symposium on Theory of Computing. 129--140. Google ScholarDigital Library
- Odlyzko, A. 2003. Privacy, economics, and price discrimination on the Internet. In Proceedings of the 5th ACM International Conference on Electronic Commerce (EC). 355--366. Google ScholarDigital Library
- Raghavan, T. E. S. and Filar, J. A. 1991. Algorithms for stochastic games -- a survey. Math. Methods Opera. Res. 35, 437--472.Google ScholarCross Ref
- Raya, M. and Hubaux, J.-P. 2005. The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks. 21. Google ScholarDigital Library
- Raya, M., Manshaei, M. H., Felegyhazi, M., and Hubaux, J.-P. 2008. Revocation games in ephemeral networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Google ScholarDigital Library
- Raya, M., Shokri, R., and Hubaux, J.-P. 2010. On the tradeoff between trust and privacy in wireless ad hoc networks. In Proceedings of the ACM Conference on Wireless Network Security (WiSec). Google ScholarDigital Library
- Rehák, M., Pěchouček, M., and Tožička, J. 2005. Adversarial behavior in multi-agent systems. In Proceedings of the Multi-Agent Systems and Applications IV, Lecture Notes in Computer Science, vol. 3690, Springer, 470--479. Google ScholarDigital Library
- Reidt, S., Srivatsa, M., and Balfe, S. 2009. The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Google ScholarDigital Library
- Saad, W., Han, Z., Başar, T., Debbah, M., and Hjørungnes, A. 2009. Physical layer security: Coalitional games for distributed cooperation. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). Google ScholarDigital Library
- Sagduyu, Y., Berry, R., and Ephremides, A. 2009. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). 130--139. Google ScholarDigital Library
- Sallhammar, K., Helvik, B., and Knapskog, S. 2006. On stochastic modeling for integrated security and dependability evaluation. J. Netw. 1, 5, 31.Google Scholar
- Schaelicke, L., Slabach, T., Moore, B., and Freeland, C. 2003. Characterizing the performance of network intrusion detection sensors. In Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 2820, Springer, 155--172.Google Scholar
- Semret, N., Liao, R., Campbell, A., and Lazar, A. 2000. Peering and provisioning of differentiated internet services. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).Google Scholar
- Sen, P., Chaki, N., and Chaki, R. 2008. HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. In Proceedings of the Computer Information Systems and Industrial Management Applications (CISIM). 121--126. Google ScholarDigital Library
- SnortTeam. 2010. Snort users manual. http://www.snort.org, 2.8.6 ed.Google Scholar
- Sommer, P. 2007. Design and analysis of realistic mobility model for wireless mesh networks. M.S. Thesis, ETH Zurich, Switzerland.Google Scholar
- Theodorakopoulos, G. and Baras, J. 2007. Malicious users in unstructured networks. In Proceedings of the 26th Annual IEEE International Conference on Computer Communications (INFOCOM).Google Scholar
- Varian, H. 2009. Economic aspects of personal privacy. In Internet Policy and Economics, Springer, 101--109.Google Scholar
- Vratonjic, N., Manshaei, M., Raya, M., and Hubaux, J.-P. 2010a. ISPs and ad networks against botnet ad fraud. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec). Google ScholarDigital Library
- Vratonjic, N., Raya, M., Hubaux, J.-P., and Parkes, D. 2010b. Security games in online advertising: Can ads help secure the web? In Proceedings of the Workshop on the Economics of Information Security (WEIS).Google Scholar
- Wasserman, S. and Faust, K. 1994. Social Network Analysis: Methods and Applications. Cambridge Univiversity Press, Cambridge, U.K.Google Scholar
- Weibel, A. and Winterhalter, L. 2005. Bluetella: File sharing for bluetooth enabled mobile phones. M.S. Thesis, Swiss Federal Institute of Technology Zurich (ETHZ), Switzerland.Google Scholar
- Wu, Y., Foo, B., Mei, Y., and Bagchi, S. 2003. Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS. In Proceedings of the 19th Annual Computer Security Applications Conference. 234--244. Google ScholarDigital Library
- Wyner, A. D. 1975. The wire-tap channel. Bell Syst. Tech. J.Google ScholarCross Ref
- Yan, Y., El-Atawy, A., and Al-Shaer, E. 2007. Ranking-based optimal resource allocation in peer-to-peer networks. In Proceedings of the 26th Annual IEEE International Conference on Computer Communications (INFOCOM).Google Scholar
- Yegneswaran, V., Barford, P., and Jha, S. 2004. Global intrusion detection in the DOMINO overlay system. In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google Scholar
- Yu, W. and Liu, K. J. R. 2007. Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mobile Comput. 6, 5, 459--473. Google ScholarDigital Library
- Zhang, N., Yu, W., Fu, X., and Das, S. K. 2010a. gPath: A game-theoretic path selection algorithm to protect Tor's anonymity. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes in Computer Science, vol. 6442, Springer, 58--72. Google ScholarDigital Library
- Zhang, N., Yu, W., Fu, X., and Das, S. K. 2010b. Maintaining defender's reputation in anomaly detection against insider attacks. IEEE Trans. Syst., Man, Cybernetics, Part B: Cybernetics 40. Google ScholarDigital Library
- Zhou, C., Karunasekera, S., and Leckie, C. 2005. A peer-to-peer collaborative intrusion detection system. In Proceedings of the International Conference on Networks.Google Scholar
- Zhu, Q. and Başar, T. 2009. Dynamic policy-based IDS configuration. In Proceedings of the 47th IEEE Conference on Decision and Control (CDC).Google Scholar
- Zhu, Q. and Başar, T. 2011a. Indices of power in optimal IDS default configuration: Theory and examples. In Proceedings of the 2nd Conference on Decision and Game Theory (GameSec). Google ScholarDigital Library
- Zhu, Q. and Başar, T. 2011b. Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference.Google Scholar
- Zhu, Q. and Başar, T. 2011c. Towards a unifying security framework for cyber-physical systems. In Proceedings of the Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11).Google Scholar
- Zhu, Q. and Başar, T. 2012. A Hierarchical Security Architecture for smart grid: From theory to practice. In Proceedings of the Smart Grid Communications and Networking, E. Hossain, Z. Han, and H. V. Poor, Eds., Cambridge University Press, Cambridge, U.K.Google Scholar
- Zhu, Q., Fung, C., Boutaba, R., and Başar, T. 2009. A game-theoretical approach to incentive design in collaborative intrusion detection networks. In Proceedings of the International Conference on Game Theory for Networks (GameNets). 384--392. Google ScholarDigital Library
- Zhu, Q., Li, H., Han, Z., and Başar, T. 2010. A stochastic game model for jamming in multi-channel cognitive radio systems. In Proceedings of the IEEE International Conference on Communications (ICC).Google Scholar
- Zhu, Q., McQueen, M., Rieger, C., and Başar, T. 2011. Management of control system information security: Control system patch management. In Proceedings of the Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11).Google Scholar
- Zhu, Q., Saad, W., Han, Z., Poor, H. V., and Başar, T. 2011. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of the IEEE (MILCOM).Google Scholar
- Zhu, Q., Tembine, H., and Başar, T. 2010a. Heterogeneous learning in zero-sum stochastic games with incomplete information. In Proceedings of the IEEE Conference on Decisions and Control (CDC).Google Scholar
- Zhu, Q., Tembine, H., and Başar, T. 2010b. Network security configuration: A nonzero-sum stochastic game approach. In Proceedings of the American Control Conference (ACC).Google Scholar
- Zhu, Q., Tembine, H., and Başar, T. 2011. Distributed strategic learning with application to network security. In Proceedings of the American Control Conference (ACC).Google Scholar
- Zonouz, S. A., Khurana, H., Sanders, W. H., and Yardley, T. M. 2009. RRE: A game-theoretic intrusion response and recovery engine. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN).Google Scholar
Index Terms
- Game theory meets network security and privacy
Recommendations
Game Theory Meets Network Security: A Tutorial
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityThe increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and ...
Game Theory for Cyber Security and Privacy
In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy, we ...
Privacy consensus in anonymization systems via game theory
DBSec'12: Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and PrivacyPrivacy protection appears as a fundamental concern when personal data is collected, stored, and published. Several anonymization methods have been proposed to address privacy issues in private datasets. Every anonymization method has at least one ...
Comments