Game theory for network security

X Liang, Y Xiao - IEEE Communications Surveys & Tutorials, 2012 - ieeexplore.ieee.org
As networks become ubiquitous in people's lives, users depend on networks a lot for
sufficient communication and convenient information access. However, networks suffer from …

A survey of game theory as applied to network security

S Roy, C Ellis, S Shiva, D Dasgupta… - 2010 43rd Hawaii …, 2010 - ieeexplore.ieee.org
Network security is a complex and challenging problem. The area of network defense
mechanism design is receiving immense attention from the research community for more …

Game theory meets network security and privacy

MH Manshaei, Q Zhu, T Alpcan, T Bacşar… - ACM Computing …, 2013 - dl.acm.org
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …

A differential game approach for real-time security defense decision in scale-free networks

H Zhang, Y Mi, X Liu, Y Zhang, J Wang, J Tan - Computer Networks, 2023 - Elsevier
The current network security defense decision method is based on the principle of attack–
defense confrontation and generally uses a random network model to project the real …

A bi-level game approach to attack-aware cyber insurance of computer networks

R Zhang, Q Zhu, Y Hayel - IEEE Journal on Selected Areas in …, 2017 - ieeexplore.ieee.org
Cyber insurance is a valuable approach to mitigate further the cyber risk and its loss in
addition to the deployment of technological cyber defense solutions, such as intrusion …

Attack-defense differential game model for network defense strategy selection

H Zhang, LV Jiang, S Huang, J Wang, Y Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
The existing game-theoretic approaches for network security problems mostly use the static
game or the multi-stage dynamic game. However, these researches can not meet the …

Game strategies in network security

K Lye, JM Wing - International Journal of Information Security, 2005 - Springer
This paper presents a game-theoretic method for analyzing the security of computer
networks. We view the interactions between an attacker and the administrator as a two …

A game theoretic defence framework against DoS/DDoS cyber attacks

T Spyridopoulos, G Karanikas, T Tryfonas… - Computers & …, 2013 - Elsevier
Game-theoretic approaches have been previously employed in the research area of network
security in order to explore the interaction between an attacker and a defender during a …

Evaluating network security and optimal active defense based on attack-defense game model

W Jiang, BX Fang, ZH Tian, HL Zhang - Chinese Journal of Computers, 2009 - cjc.ict.ac.cn
To evaluate the security of network information systems and perform active defense, this
paper presents some models including defense graph model, attack-defense taxonomy and …

[HTML][HTML] Security defense decision method based on potential differential game for complex networks

H Zhang, Y Mi, Y Fu, X Liu, Y Zhang, J Wang, J Tan - Computers & Security, 2023 - Elsevier
Most defense strategies in complex networks are developed from the defense perspective,
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …