The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.
Published in | Advances in Wireless Communications and Networks (Volume 3, Issue 4) |
DOI | 10.11648/j.awcn.20170304.13 |
Page(s) | 45-49 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Game Theory, Cyber Security, Security Games, Players
[1] | M. J. Osborne, “An Introduction to Game Theory by Please send comments to Department of Economics This version ,” 2000. |
[2] | A. Fielder, E. Panaousis, P. Malacaria, C. Hankin, and F. Smeraldi, “Game Theory Meets Information Security Management,” in Information Security and Privacy Conference, 2014, 2014, pp. 15–29. |
[3] | K. Lye and J. Wing, “Game Strategies in Network Security,” Copenhagen, Denmark, 2002. |
[4] | S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A survey of game theory as applied to network security,” Syst. Sci. (HICSS), 2010 43rd Hawaii Int. Conf., pp. 1–10, 2010. |
[5] | John. F. Nash, “Equilibrium Points in n-Person Games,” in Proceedings of the National Academy of Sciences of the United States of America, Published by : National Academy of Sciences, 2013, vol. 36, no. 1, pp. 48–49. |
[6] | C. F. Camerer, T. Ho, and J. K. Chong, “Behavioural Game Theory: Thinking, Learning and Teaching ∗.” |
[7] | A. Gueye, “A Game Theoretical Approach to Communication Security,” 2011. |
[8] | K. Leyton-Brown and Y. Shoham, Essentials of game theory. Morgan & Claypool Publishers series, 2008. |
[9] | S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, “Challenges in Applying Game Theory to the Domain of Information Warfare,” Proc. 4th Inf. Surviv. Work., 2002. |
[10] | A. Chakrabarti and G. Manimaran, “Internet Infrastructure Security: A Taxonomy,” IEEE Netw., no. December, pp. 13–21, 2002. |
[11] | J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39–53, 2004. |
[12] | J. P. Hespanha and S. Bohacek, “Preliminary Results in Routing Games,” Am. Control Conf. 2001. Proc. 2001. IEEE, vol. 3, pp. 1904–1909, 2001. |
[13] | J. McInerney, S. Stubberud, and S. Anwar, “Friars: a feedback control system for information assurance using a markov decision process,” Technol. 2001, 2001. |
[14] | P. F. Syverson, “A different look at secure distributed computation,” in Proceedings 10th Computer Security Foundations Workshop, 1997, pp. 109–115. |
[15] | S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proc. 6th Annu., 2000. |
[16] | Y. Liu, C. Comaniciu, and H. Man, “Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection,” Int. J. Secur. Networks, vol. 1, no. 3/4, p. 243, 2006. |
[17] | Z. Shuang-can, H. Chen-jun, and W. Zhang, “Distributed intrusion detection system based on BP neural network,” Int. J. Secur. its Appl., vol. 8, no. 2, pp. 183–192, 2009. |
[18] | M. Kodialam and T. V Lakshman, “Detecting Network Intrusions via Sampling: A Game Theoretic Approach,” Infocom, vol. 0, no. C, 2003. |
[19] | A. Agah, S. K. Das, and K. Basu, “A game theory based approach for security in wireless sensor networks,” in IEEE International Conference on Performance, Computing, and Communications, 2004, 2004, pp. 259–263. |
[20] | T. Alpcan and T. Basar, “A game theoretic approach to decision and analysis in network intrusion detection,” in 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), 2003, vol. 3, pp. 2595–2600. |
[21] | Syverson, P. F, "A different look at secure distributed computation". In Proceedings 10th Computer Security Foundations Workshop, IEEE Comput. Soc. Press. http://doi.org/10.1109/CSFW.1997.59679, 1997, pp. 109–115. |
APA Style
Amadi Emmanuuel Chukwudi, Eze Udoka, Ikerionwu Charles. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, 3(4), 45-49. https://doi.org/10.11648/j.awcn.20170304.13
ACS Style
Amadi Emmanuuel Chukwudi; Eze Udoka; Ikerionwu Charles. Game Theory Basics and Its Application in Cyber Security. Adv. Wirel. Commun. Netw. 2017, 3(4), 45-49. doi: 10.11648/j.awcn.20170304.13
AMA Style
Amadi Emmanuuel Chukwudi, Eze Udoka, Ikerionwu Charles. Game Theory Basics and Its Application in Cyber Security. Adv Wirel Commun Netw. 2017;3(4):45-49. doi: 10.11648/j.awcn.20170304.13
@article{10.11648/j.awcn.20170304.13, author = {Amadi Emmanuuel Chukwudi and Eze Udoka and Ikerionwu Charles}, title = {Game Theory Basics and Its Application in Cyber Security}, journal = {Advances in Wireless Communications and Networks}, volume = {3}, number = {4}, pages = {45-49}, doi = {10.11648/j.awcn.20170304.13}, url = {https://doi.org/10.11648/j.awcn.20170304.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20170304.13}, abstract = {The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.}, year = {2017} }
TY - JOUR T1 - Game Theory Basics and Its Application in Cyber Security AU - Amadi Emmanuuel Chukwudi AU - Eze Udoka AU - Ikerionwu Charles Y1 - 2017/07/27 PY - 2017 N1 - https://doi.org/10.11648/j.awcn.20170304.13 DO - 10.11648/j.awcn.20170304.13 T2 - Advances in Wireless Communications and Networks JF - Advances in Wireless Communications and Networks JO - Advances in Wireless Communications and Networks SP - 45 EP - 49 PB - Science Publishing Group SN - 2575-596X UR - https://doi.org/10.11648/j.awcn.20170304.13 AB - The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security. VL - 3 IS - 4 ER -