skip to main content
Skip header Section
Network Security: A Decision and Game-Theoretic ApproachNovember 2010
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-11932-0
Published:30 November 2010
Pages:
332
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.

Cited By

  1. Xie Q, Wang J and Jin L (2024). Cost-aware defense for parallel server systems against reliability and security failures, Automatica (Journal of IFAC), 160:C, Online publication date: 1-Feb-2024.
  2. Li Y, Yang Y, Chai T and Chen T (2022). Stochastic detection against deception attacks in CPS, Automatica (Journal of IFAC), 144:C, Online publication date: 1-Oct-2022.
  3. Konorski J (2022). Defending against fake VIP in scant-transparency information systems with QoS differentiation, Information Sciences: an International Journal, 607:C, (831-848), Online publication date: 1-Aug-2022.
  4. Aggarwal P, Thakoor O, Jabbari S, Cranford E, Lebiere C, Tambe M and Gonzalez C (2022). Designing effective masking strategies for cyberdefense through human experimentation and cognitive models, Computers and Security, 117:C, Online publication date: 1-Jun-2022.
  5. Oliveira T, Rodrigues V, Krstić M and Başar T (2021). Nash Equilibrium Seeking in Quadratic Noncooperative Games Under Two Delayed Information-Sharing Schemes, Journal of Optimization Theory and Applications, 191:2-3, (700-735), Online publication date: 1-Dec-2021.
  6. Liu L, Zhang L, Liao S, Liu J and Wang Z (2021). A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense, Information Sciences: an International Journal, 577:C, (245-264), Online publication date: 1-Oct-2021.
  7. ACM
    Wang L, Iyengar S, Belman A, Śniatała P, Phoha V and Wan C (2021). Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation, Digital Threats: Research and Practice, 2:2, (1-24), Online publication date: 30-Jun-2021.
  8. Miao L, Li S and Zhu Q (2021). Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  9. Chen J, Touati C and Zhu Q (2019). A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network, IEEE Transactions on Information Forensics and Security, 15, (462-474), Online publication date: 1-Jan-2020.
  10. Li Y, Shi D and Chen T (2020). Secure analysis of dynamic networks under pinning attacks against synchronization, Automatica (Journal of IFAC), 111:C, Online publication date: 1-Jan-2020.
  11. ACM
    Kiennert C, Ismail Z, Debar H and Leneutre J (2018). A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization, ACM Computing Surveys, 51:5, (1-31), Online publication date: 30-Sep-2019.
  12. Szeszlér D (2019). Hitting a path, Journal of Combinatorial Optimization, 38:1, (72-85), Online publication date: 1-Jul-2019.
  13. Thakoor O, Tambe M, Vayanos P, Xu H and Kiekintveld C General-Sum Cyber Deception Games under Partial Attacker Valuation Information Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (2215-2217)
  14. Huang K, Li P, Yang L, Yang X, Tang Y and Namin A (2019). Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  15. Miao L and Li S (2018). A Differential Game-Theoretic Approach for the Intrusion Prevention Systems and Attackers in Wireless Networks, Wireless Personal Communications: An International Journal, 103:3, (1993-2003), Online publication date: 1-Dec-2018.
  16. Xiao L, Xu D, Mandayam N and Poor H (2018). Attacker-Centric View of a Detection Game against Advanced Persistent Threats, IEEE Transactions on Mobile Computing, 17:11, (2512-2523), Online publication date: 1-Nov-2018.
  17. Demazy A, Kalloniatis A and Alpcan T A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model Decision and Game Theory for Security, (248-264)
  18. ACM
    Boudko S and Abie H An evolutionary game for integrity attacks and defences for advanced metering infrastructure Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, (1-7)
  19. ACM
    Jajodia S, Park N, Serra E and Subrahmanian V (2018). SHARE, ACM Transactions on Internet Technology, 18:3, (1-41), Online publication date: 31-Aug-2018.
  20. Schlenker A, Thakoor O, Xu H, Fang F, Tambe M, Tran-Thanh L, Vayanos P and Vorobeychik Y Deceiving Cyber Adversaries Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (892-900)
  21. Wu H and Wang Z (2018). Multi-source fusion-based security detection method for heterogeneous networks, Computers and Security, 74:C, (55-70), Online publication date: 1-May-2018.
  22. Vamvoudakis K and Hespanha J (2018). Game-Theory-Based Consensus Learning of Double-Integrator Agents in the Presence of Worst-Case Adversaries, Journal of Optimization Theory and Applications, 177:1, (222-253), Online publication date: 1-Apr-2018.
  23. Li P, Yang X, Xiong Q, Wen J, Tang Y and Del Rey A (2018). Defending against the Advanced Persistent Threat, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  24. Dritsoula L, Loiseau P and Musacchio J (2017). A Game-Theoretic Analysis of Adversarial Classification, IEEE Transactions on Information Forensics and Security, 12:12, (3094-3109), Online publication date: 1-Dec-2017.
  25. Jajodia S, Park N, Pierazzi F, Pugliese A, Serra E, Simari G and Subrahmanian V (2017). A Probabilistic Logic of Cyber Deception, IEEE Transactions on Information Forensics and Security, 12:11, (2532-2544), Online publication date: 1-Nov-2017.
  26. Papaj J, Dobos L and Cizmar A (2017). Hybrid MANET---DTN and a New Algorithm for Relay Nodes Selection, Wireless Personal Communications: An International Journal, 96:4, (5145-5166), Online publication date: 1-Oct-2017.
  27. Panaousis E, Karapistoli E, Elsemary H, Alpcan T, Khuzani M and Economides A (2017). Game theoretic path selection to support security in device-to-device communications, Ad Hoc Networks, 56:C, (28-42), Online publication date: 1-Mar-2017.
  28. Shen J, Feng D and Antonopoulos A (2017). Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  29. Szeszlér D (2017). Security games on matroids, Mathematical Programming: Series A and B, 161:1-2, (347-364), Online publication date: 1-Jan-2017.
  30. Goyal S, Jabbari S, Kearns M, Khanna S and Morgenstern J Strategic Network Formation with Attack and Immunization Proceedings of the 12th International Conference on Web and Internet Economics - Volume 10123, (429-443)
  31. Zhou Z, Bambos N and Glynn P Dynamics on Linear Influence Network Games Under Stochastic Environments 7th International Conference on Decision and Game Theory for Security - Volume 9996, (114-126)
  32. Anderson G, Mccusker G and Pym D A Logic for the Compliance Budget 7th International Conference on Decision and Game Theory for Security - Volume 9996, (370-381)
  33. Noureddine M, Fawaz A, Sanders W and Başar T A Game-Theoretic Approach to Respond to Attacker Lateral Movement 7th International Conference on Decision and Game Theory for Security - Volume 9996, (294-313)
  34. ACM
    Pevny T and Somol P Discriminative Models for Multi-instance Problems with Tree Structure Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (83-91)
  35. Dahan M, Perelman L and Amin S Network sensing for security against link disruption attacks 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (808-815)
  36. Fielder A, Panaousis E, Malacaria P, Hankin C and Smeraldi F (2016). Decision support approaches for cyber security investment, Decision Support Systems, 86:C, (13-23), Online publication date: 1-Jun-2016.
  37. Njilla L, Pissinou N and Makki K (2016). Game theoretic modeling of security and trust relationship in cyberspace, International Journal of Communication Systems, 29:9, (1500-1512), Online publication date: 1-Jun-2016.
  38. Han Y, Alpcan T, Chan J, Leckie C and Rubinstein B (2016). A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning, IEEE Transactions on Information Forensics and Security, 11:3, (556-570), Online publication date: 1-Mar-2016.
  39. Furuncu E and Sogukpinar I (2015). Scalable risk assessment method for cloud computing using game theory (CCRAM), Computer Standards & Interfaces, 38:C, (44-50), Online publication date: 1-Feb-2015.
  40. ACM
    Zhu M, Hu Z and Liu P Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed Proceedings of the First ACM Workshop on Moving Target Defense, (51-58)
  41. ACM
    DeBruhl B, Kroer C, Datta A, Sandholm T and Tague P Power napping with loud neighbors Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, (117-128)
  42. ACM
    Hu H, Ahn G, Zhao Z and Yang D Game theoretic analysis of multiparty access control in online social networks Proceedings of the 19th ACM symposium on Access control models and technologies, (93-102)
  43. ACM
    Savola R and Abie H Metrics-driven security objective decomposition for an e-health application with adaptive security management Proceedings of the International Workshop on Adaptive Security, (1-8)
  44. ACM
    Manshaei M, Zhu Q, Alpcan T, Bacşar T and Hubaux J (2013). Game theory meets network security and privacy, ACM Computing Surveys, 45:3, (1-39), Online publication date: 1-Jun-2013.
  45. Vaněk O, Yin Z, Jain M, Bošanský B, Tambe M and Pěchouček M Game-theoretic resource allocation for malicious packet detection in computer networks Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (905-912)
  46. ACM
    Clark A, Bushnell L and Poovendran R Leader selection games under link noise injection attacks Proceedings of the 1st international conference on High Confidence Networked Systems, (31-40)
  47. Hao D, Adhikari A and Sakurai K Mixed-Strategy game based trust management for clustered wireless sensor networks Proceedings of the Third international conference on Trusted Systems, (239-257)
  48. Maillé P, Reichl P and Tuffin B Interplay between security providers, consumers, and attackers Proceedings of the Second international conference on Decision and Game Theory for Security, (67-86)
  49. Alpcan T, Levi A and Savaş E Digital trust games Proceedings of the Second international conference on Decision and Game Theory for Security, (182-200)
  50. Santos F, Humbert M, Shokri R and Hubaux J Collaborative location privacy with rational users Proceedings of the Second international conference on Decision and Game Theory for Security, (163-181)
  51. Hao D, Ren Y and Sakurai K A game theory-based surveillance mechanism against suspicious insiders in MANETs Proceedings of the Second international conference on Trusted Systems, (237-252)
  52. Amin S, Schwartz G and Sastry S Security interdependencies for networked control systems with identical agents Proceedings of the First international conference on Decision and game theory for security, (107-122)
Contributors
  • University of Melbourne
  • University of Illinois Urbana-Champaign

Recommendations