Game Theory for Network Security

  title={Game Theory for Network Security},
  author={Xiannuan Liang and Yang Xiao},
  journal={IEEE Communications Surveys & Tutorials},
As networks become ubiquitous in people's lives, users depend on networks a lot for sufficient communication and convenient information access. However, networks suffer from security issues. Network security becomes a challenging topic since numerous new network attacks have appeared increasingly sophisticated and caused vast loss to network resources. Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks. In this paper, we review the existing… CONTINUE READING
Highly Cited
This paper has 128 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.
Showing 1-10 of 83 extracted citations

A game theoretic model of computer network exploitation campaigns

2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) • 2018
View 6 Excerpts
Highly Influenced

A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems

IEEE Transactions on Information Forensics and Security • 2018
View 1 Excerpt

129 Citations

Citations per Year
Semantic Scholar estimates that this publication has 129 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 74 references

How Bad Are Selfish Investments in Network Security?

IEEE/ACM Transactions on Networking • 2011
View 9 Excerpts
Highly Influenced

Coalitional Game Theory for Security Risk Management

2010 Fifth International Conference on Internet Monitoring and Protection • 2010
View 5 Excerpts
Highly Influenced

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks

IEEE Transactions on Information Forensics and Security • 2009
View 7 Excerpts
Highly Influenced

A game theoretical attack-defense model oriented to network security risk assessment

W. He, C. Xia, H. Wang, C. Zheng, Y. Ji
2008 International Conference on Computer Science and Software Engineering, pp. 498 - 504, 2008. • 2008
View 6 Excerpts
Highly Influenced

Intrusion Response as a Resource Allocation Problem

Proceedings of the 45th IEEE Conference on Decision and Control • 2006
View 4 Excerpts
Highly Influenced

Using Stochastic Game Theory to Compute the Expected Behavior of Attackers

2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops) • 2005
View 7 Excerpts
Highly Influenced

A game theoretic approach to modeling intrusion detection in mobile ad hoc networks

Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. • 2004
View 5 Excerpts
Highly Influenced

A course in game theory

M. J. Obsborne, A. Rubinstein
View 6 Excerpts
Highly Influenced

Game Theory for Applied Economists

R. Gibbons
View 20 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…