Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1748111.1748149guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Survey of Game Theory as Applied to Network Security

Published: 05 January 2010 Publication History

Abstract

Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theoretic approaches to address the network security issues and some of these approaches look promising. This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions. This taxonomy should provide the reader with a better understanding of game theoretic solutions to a variety of cyber security problems.

Cited By

View all
  • (2024)CareerSim: Gamification Design Leveraging LLMs For Career Development ReflectionExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650928(1-7)Online publication date: 11-May-2024
  • (2022)End-to-end stochastic optimization with energy-based modelProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3601094(11341-11354)Online publication date: 28-Nov-2022
  • (2022)Anti-Malware Sandbox GamesProceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems10.5555/3535850.3535984(1201-1209)Online publication date: 9-May-2022
  • Show More Cited By
  1. A Survey of Game Theory as Applied to Network Security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    HICSS '10: Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
    January 2010
    4670 pages
    ISBN:9780769538693

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 05 January 2010

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)CareerSim: Gamification Design Leveraging LLMs For Career Development ReflectionExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650928(1-7)Online publication date: 11-May-2024
    • (2022)End-to-end stochastic optimization with energy-based modelProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3601094(11341-11354)Online publication date: 28-Nov-2022
    • (2022)Anti-Malware Sandbox GamesProceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems10.5555/3535850.3535984(1201-1209)Online publication date: 9-May-2022
    • (2021)Deterrence of Intelligent DDoS via Multi-Hop Traffic DivergenceProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484737(923-939)Online publication date: 12-Nov-2021
    • (2021)Securing system-of-systems through a game theory approachProceedings of the 36th Annual ACM Symposium on Applied Computing10.1145/3412841.3442125(1443-1446)Online publication date: 22-Mar-2021
    • (2020)Scalable Game-Focused Learning of Adversary ModelsProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3398928(1449-1457)Online publication date: 5-May-2020
    • (2019)Automating Network Security Analysis at Packet-level by using Rule-based EngineProceedings of the 6th Conference on the Engineering of Computer Based Systems10.1145/3352700.3352714(1-8)Online publication date: 2-Sep-2019
    • (2019)A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and PrivacyACM Computing Surveys10.1145/333777252:4(1-28)Online publication date: 30-Aug-2019
    • (2019)GPLADDACM Transactions on Privacy and Security10.1145/332628322:3(1-27)Online publication date: 10-Jun-2019
    • (2019)Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennasWireless Networks10.1007/s11276-018-1713-425:6(3205-3222)Online publication date: 1-Aug-2019
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media