Current Situation and Prospect of Game Theory based Network Security Methods
DOI:
https://doi.org/10.62051/1s27c095Keywords:
Game Theory; Network Security; Offensive and Defensive Model.Abstract
The attack and defense model of network security based on game theory has developed into an effective network security model. It is a hot topic in the field of network and information security to use the idea of game theory to attack and defend the network security. This paper analyzes the general model of game theory in the field of security. This paper also analyzes the general model of network security attack and defense game. This paper also analyzes the game theory model of cryptographic protocol. This paper studies the existing network security methods based on game theory, reviews the development and evolution process and technical core of network security based on game theory, and compares the specificity of network security models based on game theory. Finally, the paper discusses the problems in the field of network security based on game theory, and tries to forecast its future development trend.
Downloads
References
R. Anderson. Why information security is hard - an economic perspective. Seventeenth Annual Computer Security Applications Conference, pages 358–365, 2001.
Branislav Bosansky, Christopher Kiekintveld, Viliam Lisy, Jiri Cermak, and Michal Pechoucek. Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games. International Conference on Autonomous Agents and Multi-agent Systems, 2013.
E. Bursztein and J. Goubault-Larrecq. A logical framework for evaluating network resilience against faults and attacks. Annual Asian Computing Science Conference, 2007.
Deng-Guo Feng, Min Zhang, Yan Zhang, and Zhen Xu. Study on cloud computing security. Journal of Software, 22:71–83, 01 2011.
K Horák, Q. Zhu, and Branislav Boansk. Manipulating adversary’s belief: A dynamic game approach to deception by design for proactive network security. International Conference on Decision and Game Theory for Security, 2017.
C. Kiekintveld, Viliam Lis, and R Píbil. Game-theoretic foundations for the strategic use of honeypots in network security. Springer International Publishing, 2015.
Fei Liu, Hongyan Gao, and Zegang Wei. Research on the game of network security attack-defense confrontation through the optimal defense strategy. Security and Privacy, 2021.
H. Saidi, D. Gretete, and A. Addaim. Game Theory for Wireless Sensor Network Security. Fourth International Congress on Information and Communication Technology, 2020.
K. W. Lye and J. M. Wing. Game strategies in network security. International Journal of Information Security, 4(1-2):71–86, 2005.
M. H. Manshaei and Q Zhu. Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 2013.
Patcha and J. M. Park. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. Information Assurance Workshop, 2005. 1
S. Shiva, Sankardas Roy, and Dipankar Dasgupta. Game theory for cyber security. 04 2010.
Jason Tsai, Shyamsunder Rathi, Christopher Kiekintveld, Fernando Ordóñez, and Milind Tambe. Iris – a tool for strategic security allocation in transportation networks, 2009.
von Stackelberg. Marktform und gleichgewicht. New York:Springer, 1934.
Jiang Wei, Fang Binxing, Tian Zhihong, and Zhang Hongli. Network security evaluation and optimal active defense based on offense and defense game model. chinese computer science, 32(004):817–827, 2009.
W. Yong. Research on network security situation prediction based on markov game theory. International Journal of Security and Its Applications, 10(9):301–308, 2016.
Nguyen Cong Luong Ziyao Liu. A survey on applications of game theory in blockchain. 2019.
EC Amadi, G Eheduru, F Ezea, and C Ikerionwu. Game theory application in cyber security. IEEE 3rd international conference on electrotechnology for national development (NIGERCON), 2017.
Dipak V Bhosale, Prajakta K Mitkal, and Yogesh S Lonkar. Cybersecurity using game theory. International Journal of Innovative Science, Engineering & Technology, 3(1):505–509, 2016.
Robert Gibbons et al. A primer in game theory. 1992.
Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, and Jean-Pierre Hubaux. Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3):1–39, 2013.
Roger B Myerson. Game theory. Harvard university press, 2013.
Steven Tadelis. Game theory: an introduction. Princeton university press, 2013.
Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on active defense technology in network security based on non-cooperative dynamic game theory. Journal of computer research and development, 48(2):306, 2011.
Quanyan Zhu and Stefan Rass. Game theory meets network security: A tutorial. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 2163–2165, 2018.
Downloads
Published
Conference Proceedings Volume
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







