Game Theoretical Modelling of Network/Cybersecurity

@article{Iqbal2019GameTM,
  title={Game Theoretical Modelling of Network/Cybersecurity},
  author={Azhar Iqbal and Lachlan J. Gunn and Mingyu Guo and Muhammad Ali Babar and Derek Abbott},
  journal={IEEE Access},
  year={2019},
  volume={7},
  pages={154167-154179}
}
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of decision makers in security problems who compete for limited and shared resources. This article presents a review of the literature in the area of game theoretical modelling of network/cybersecurity and identifies a number of challenges in this area that need to be addressed. 
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense
TLDR
A Bayesian game theory-based solution to empower service provider to maximize the social welfare by employing incentives and pricing rules on the users of a network and proposes Bayesian pricing and auction mechanism to achieve Bayesian Nash Equilibrium points in different scenarios. Expand
Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations
Cybercrime continues to cause increasing threat to business processes, eroding stakeholders’ trust in internet technologies. In this research paper, we explore how six dominant algorithmic trustExpand
Game Theoretic Honeypot Deployment in Smart Grid
TLDR
This paper investigates the use of honeypots, which are considered to mimic the common services of the smart grid and are able to detect unauthorized accesses, collect evidence, and help hide the real devices. Expand
Cyber-Physical Systems Resilience: State of the Art, Research Issues and Future Trends
TLDR
This paper hopes to provide new insights into the management of resilient CPSs, formed by IoT devices, modelled by Game Theory, and flexibly programmed using the latest software and virtualization platforms. Expand
Beyond Herd Immunity Against Strategic Attackers
TLDR
An analytical model is proposed which allows us to capture the impact of countermeasures against attackers when both endogenous as well as exogenous infections coexist, and shows that a diverse set of potential attacks produces non-trivial equilibria, some of which go counter to herd immunity. Expand
Dangerous games: A literature review on cybersecurity investments
Cybersecurity has gained prominence in the decision-making of firms. Due to the increasing occurrences of threats in the cyberspace, investments in cybersecurity have become critical to mitigate theExpand
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience
TLDR
This paper hopes to provide new insights into the design and management of resilient FCSs that are formed by IoT devices, edge computer servers and wireless sensor networks; these systems can be modelled using Game Theory, and flexibly programmed with the latest software and virtualization platforms. Expand

References

SHOWING 1-10 OF 125 REFERENCES
Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach
TLDR
A new game formulation combining simulation and game-theoretic approaches is proposed and illustrated that addresses the main challenging issues in the application of security games in cyberspace. Expand
A coalitional game theory approach for cybersecurity information sharing
TLDR
This paper forms a coalitional game between organizations and analyzes the well-known Shapley value and Nucleolus solution concepts in cybersecurity information sharing system to formulate a rewarding and participation-fee calculation based on profit sharing in coalitionalgame theory. Expand
A Survey of Game Theory as Applied to Network Security
TLDR
This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions and should provide the reader with a better understanding of game theory solutions to a variety of cyber security problems. Expand
Game Theory for Security Investments in Cyber and Supply Chain Networks
GAME THEORY FOR SECURITY INVESTMENTS IN CYBER AND SUPPLY CHAIN NETWORKS
Cybersecurity Games and Investments: A Decision Support Approach
TLDR
This work model the cybersecurity environment of an organization and derives the Nash Equilibria of a series of control-games which can be used to advise security managers on how they should spend an available cybersecurity budget given their organization profile. Expand
Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management
Security is one of the main concerns in current telecommunication networks: the service providers and individual users have to protect themselves against attacks, and to this end a careful analysisExpand
Network Security: A Decision and Game-Theoretic Approach
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control,Expand
A Stochastic Game-Theoretic Model for Smart Grid Communication Networks
TLDR
A belief-updating mechanism for both players to form a common belief about the current game state is proposed and the computation of Nash equilibria for the designed game model is discussed. Expand
Game theoretical security detection strategy for networked systems
TLDR
A sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels and the convexity restrictions can be relaxed and the computational complexity is effectively reduced, with comparison to the existing recursive calculation methods. Expand
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance
TLDR
This paper considers these players, i.e. organizations, adversary, and insure, to model a three layer game, where players play sequentially to find out their optimal strategies, and observes that when cyber-insurance is not considered, attacker prefers to increase its rate of attack. Expand
...
1
2
3
4
5
...