Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Game theory meets network security and privacy

Published: 03 July 2013 Publication History

Abstract

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

References

[1]
Abraham, I., Dolev, D., Gonen, R., and Halpern, J. 2006. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In Proceedings of the 25th ACM Annual Symposium on Principles of Distributed Computing (PODC). 53--62.
[2]
Abraham, I., Dolev, D., and Halpern, J. 2008. Lower bounds on implementing robust and resilient mediators. In Proceedings of the Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, Springer, 302--319.
[3]
Acquisti, A. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce (EC). 21--29.
[4]
Acquisti, A., Dingledine, R., and Syverson, P. 2003. On the economics of anonymity. In Proceedings of the Financial Cryptography (FC), Lecture Notes in Computer Science, vol. 2742, Springer, 84--102.
[5]
Afanasyev, M., Chen, T., Voelker, G., and Snoeren, A. 2008. Analysis of a mixed-use urban WiFi network: When metropolitan becomes neapolitan. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement. 85--98.
[6]
Alpcan, T. and Başar, T. 2003. A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control (CDC).
[7]
Alpcan, T. and Başar, T. 2004. A game theoretic analysis of intrusion detection in access control systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC).
[8]
Alpcan, T. and Başar, T. 2006. An intrusion detection game with limited observations. In Proceedings of the 12th International Symposium on Dynamic Games and Applications.
[9]
Alpcan, T. and Başar, T. 2011. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press.
[10]
Altman, E., Avrachenkov, K., and Garnaev, A. 2009. Jamming in wireless networks: The case of several jammers. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets).
[11]
Anderson, R. and Moore, T. 2006. The economics of information security. Science 314, 5799, 610.
[12]
Apt, K. and Witzel, A. 2006. A generic approach to coalition formation. In Proceedings of the International Workshop on Computational Social Choice (COMSOC).
[13]
Årnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M., and Knapskog, S. 2006. Real-time risk assessment with network sensors and intrusion detection systems. In Proceedings of the Computational Intelligence and Security, Lecture Notes in Computer Science, vol. 3802, Springer, 388--397.
[14]
August, T. and Tunca, T. 2006. Network software security and user incentives. Manage. Sci. 52, 11 (November), 1703--1720.
[15]
Başar, T. 1983. The Gaussian test channel with an intelligent jammer. IEEE Trans. Inform. Theory 29, 1, 152--157.
[16]
Başar, T. and Olsder, G. J. 1999. Dynamic Noncooperative Game Theory 2nd ed. SIAM, Philadelphia, PA.
[17]
Bilogrevic, I., Manshaei, M. H., Raya, M., and Hubaux, J.-P. 2010. Optimal revocations in ephemeral networks: a game-theoretic framework. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[18]
Bohme, R. and Moore, T. 2009. The iterated weakest link: A model of adaptive security investment. In Proceedings of the Workshop on the Economics of Information Security (WEIS).
[19]
Bohme, R. and Schwartz, G. 2010. Modeling cyber-insurance: Towards a unifying framework. In Proceedings of the Workshop on the Economics of Information Security (WEIS).
[20]
Bolot, J. and Lelarge, M. 2008. Cyber insurance as an incentive for internet security. In Proceedings of the Workshop on Economics of Information Security (WEIS).
[21]
Borden, J. M., Mason, D. M., and McEliece, R. J. 1985. Some information theoretic saddlepoints. SIAM J. Control Optim. 23, 1, 129--143.
[22]
Boutaba, R. and Aib, I. 2007. Policy-based management: A historical perspective. J. Netw. Syst. Manage. 15, 4, 447--480.
[23]
Braun, C. and Schifferle, S. 2005. BlueDating - dating application for Bluetooth enabled mobile phones. Tech. rep. ETH Zurich, Switzerland, TIK-SA-2005.08.
[24]
Bretscher, K. 2005. BlueLocation. Tech. rep. ETH Zurich, Switzerland, TIK-SA-2005-17.
[25]
Bro. 2010. Bro intrusion detection system users manual. http://www.bro-ids.org.
[26]
Buchegger, S. and Alpcan, T. 2008. Security games for vehicular networks. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing. 244--251.
[27]
Buttyan, L. and Hubaux, J.-P. 2008. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, Cambridge, U.K.
[28]
Duma, C., Karresand, M. N. S., and Caronni, G. 2006. A trustaware p2p-based overlay for intrusion detection. In Proceedings of the International Conference on Database and Expert Systems Applications Workshops.
[29]
Camp, L. J. 2006. Economics of information security. http://ssrn.com/abstract=889442.
[30]
Campos, L. 1989. Fuzzy linear programming models to solve fuzzy matrix games. Fuzzy Sets Syst. 32, 3, 275--289.
[31]
Cavusoglu, H., Cavusoglu, H., and Raghunathan, S. 2008. Security patch management: Share the burden or share the damage. Manage. Sci. 54, 4 (April), 657--670.
[32]
Chan, H., Gligor, V. D., Perrig, A., and Muralidharan, G. 2005. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. Depend. Secure Comput. 2, 3, 233--247.
[33]
Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2.
[34]
Chen, L. and Leneutre, J. 2009. A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inform. Forensics Secur. 4, 2, 165--178.
[35]
Chen, R., Park, J., and Reed, J. 2008. Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Select. Areas Commun. 26, 1, 25--37.
[36]
Csiszar, I. and Korner, J. 1978. Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 54, 2470--2492.
[37]
Debar, H., Dacier, M., and Wespi, A. 2005. Towards a taxonomy of intrusion detection systems. Comput. Netw. 31, 8, 805--822.
[38]
Dodis, Y., Halevi, S., and Rabin, T. 2000. A cryptographic solution to a game theoretic problem. In Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, Springer, 112--130.
[39]
Dodis, Y. and Rabin, T. 2007. Cryptography and game theory. In Proceedings of the Algorithmic Game Theory, Cambridge University Press, Cambridge, U.K., 181--209.
[40]
Douceur, J. 2002. The Sybil Attack. In Proceedings of the Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, 251--260.
[41]
Ephremides, A. and Wieselthier, J. E. 1987. A design concept for reliable mobile radio networks with frequency hopping signaling. Proc. IEEE 75, 56--73.
[42]
Fall, K. 2003. A delay-tolerant network architecture for challenged internets. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 27--34.
[43]
Freudiger, J., Manshaei, M. H., Hubaux, J.-P., and Parkes, D. C. 2009. On non-cooperative location privacy: A game-theoretic analysis. In Proceedings of the ACM Conference on Computer and Communications Security (CCS).
[44]
Fudenberg, D. and Tirole, J. 1991. Game Theory. MIT Press, Cambridge, MA.
[45]
Fung, C., Baysal, O., Zhang, J., Aib, I., and Boutaba, R. 2008. Trust management for host-based collaborative intrusion detection. In Proceedings of the 19th IFIP/IEEE International Workshop on Distributed Systems.
[46]
Fung, C., Zhang, J., Aib, I., and Boutaba, R. 2009. Robust and scalable trust management for collaborative intrusion detection. In Proceedings of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM).
[47]
Garagic, D. and Cruz, J. 2003. An approach to fuzzy noncooperative Nash games. J. Optim. Theory Appl. 118, 3, 475--491.
[48]
Gibbons, R. 1992. A Primer in Game Theory. Prentice Hall, Upper Saddle River, NJ.
[49]
Goldreich, O., Micali, S., and Wigderson, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing. 218--229.
[50]
Gordon, S. and Katz, J. 2006. Rational secret sharing, revisited. In Proceedings of the Security and Cryptography for Networks, Lecture Notes in Computer Science, vol. 4116, Springer, 229--241.
[51]
Grossklags, J., Christin, N., and Chuang, J. 2008. Secure or insure?: A game-theoretic analysis of information security games. In Proceedings of the 17th ACM International Conference on World Wide Web (WWW). 209--218.
[52]
Grossklags, J. and Johnson, B. 2009. Uncertainty in the weakest-link security game. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). 673--682.
[53]
Halpern, J. and Teague, V. 2004. Rational secret sharing and multiparty computation. In Proceedings of the 36th Annual ACM Symposium on Theory of Computing. 632.
[54]
Han, Z., Marina, N., Debbah, M., and Hjørungnes, A. 2009. Physical layer security game: How to date a girl with her boyfriend on the same table. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets).
[55]
Hatt, N. 2005. BlueFramework - Application framework for Bluetooth enabled mobile phones. Tech. rep. ETH Zurich, Switzerland, TIK-MA-2005-16.
[56]
Haykin, S. 2005. Cognitive radio: Brain-empowered wireless communications. IEEE J. Select. Areas Commun. (JSAC) 23, 2 (February).
[57]
Hossain, E., Niyato, D., and Han, Z. 2009. Dynamic spectrum access and Management in cognitive radio networks. Cambridge University Press, Cambridge, U.K.
[58]
Hui, K. L. and Png, I. 2006. The Economics of Privacy. In Handbook of Information systems and Economics, Elsevier, 471.
[59]
Humbert, M., Manshaei, M. H., Freudiger, J., and Hubaux, J.-P. 2010. Tracking games in mobile networks. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes in Computer Science, vol. 6442, Springer, 38--57.
[60]
Kantarcioglu, M., Bensoussan, A., and Hoe, C. 2010. When do firms invest in privacy-preserving technologies? In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes Computer Science, vol. 6442, Springer, 72--86.
[61]
Kashyap, A., Başar, T., and Srikant, R. 2004. Correlated jamming on MIMO Gaussian fading channels. IEEE Trans. Inform. Theory 50, 9, 2119--2123.
[62]
Katz, J. 2008. Bridging game theory and cryptography: Recent results and future directions. In Proceedings of the Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, 251--272.
[63]
Keppler, J. and Mountford, H. 1999. Handbook of Incentive Measures for Biodiversity: Design and Implementation. Organisation for Economic Co-operation and Development (OECD), Paris.
[64]
Kol, G. and Naor, M. 2008. Cryptography and game theory: Designing protocols for exchanging information. In Proceedings of the 5th Conference on Theory of Cryptography, Lecture Notes in Computer Science, vol. 4948, Springer, 320--339.
[65]
Krishna, V. 2002. Auction Theory 1st Ed. Academic Press, waltham, MA.
[66]
Kunreuther, H. and Heal, G. 2003. Interdependent security. J. Risk Uncertainty 26, 2 (March), 231--249.
[67]
Lelarge, M. and Bolot, J. 2008. A local mean field analysis of security investments in networks. In Proceedings of the 3rd ACM International Workshop on Economics of Networked Systems (NetECON).
[68]
Leung-Yan-Cheong, S. K. and Hellman, M. E. 1978. The Gaussian wiretap channel. IEEE Trans. Inform. Theory 24, 451--456.
[69]
Liu, P., Zang, W., and Yu, M. 2005. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inform. Syst. Secur. 8, 1, 78--118.
[70]
Liu, Y., Comaniciu, C., and Man, H. 2006. A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of the Workshop on Game Theory for Communications and Networks (GameNets).
[71]
Lye, K. and Wing, J. M. 2002. Game strategies in network security. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW).
[72]
Lysyanskaya, A. and Triandopoulos, N. 2006. Rationality and adversarial behavior in multi-party computation. In Proceedings of the Advances in Cryptology—CRYPTO 2006, Lecture Notes in Computer Science, vol. 4117, Springer, 180--197.
[73]
Ma, R., Lee, S., Lui, J., and Yau, D. 2004. A game theoretic approach to provide incentive and service differentiation in P2P networks. ACM SIGMETRICS Perform. Eval. Rev. 32, 1, 189--198.
[74]
Mallik, R., Scholtz, R., and Papavassilopoulos, G. 2000. Analysis of an on-off jamming situation as a dynamic game. IEEE Trans. Commun. 48, 8 (August), 1360--1373.
[75]
Medard, M. 1997. Capacity of correlated jamming channels. In Proceedings of the 35th Allerton Conference on Communication, Control, and Computing. 1043--1052.
[76]
Micali, S. and Valiant, P. 2008. Revenue in truly combinatorial auctions and adversarial mechanism design. Tech. rep. MIT, Cambridge, MA, MIT-CSAIL-TR-2008-039.
[77]
Michiardi, P. and Molva, R. 2002. Game theoretic analysis of security in mobile ad hoc networks. Research Report RR-02-070, Institut Eurecom, Sophia-Antipolis.
[78]
Miura-Ko, A., Yolken, B., Bambos, N., and Mitchell, J. 2008a. Security investment games of interdependent organizations. In Proceedings of the Allerton Conference on Communication, Control, and Computing.
[79]
Miura-Ko, R., Yolken, B., Mitchell, J., and Bambos, N. 2008b. Security decision-making among interdependent organizations. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF). 66--80.
[80]
Moore, T., Clulow, J., Nagaraja, S., and Anderson, R. 2007. New strategies for revocation in ad-hoc networks. In Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS).
[81]
Mukherjee, A. and Swindlehurst, A. L. 2010. Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers. In Proceedings of the IEEE International Conference on Communications (ICC).
[82]
Nash, J. 1951. Non-cooperative games. Ann. Math. 54, 2, 286--295.
[83]
Nguyen, K., Alpcan, T., and Başar, T. 2008. Fictitious play with imperfect observations for network intrusion detection. In Proceedings of the 13th International Symposium Dynamic Games and Applications.
[84]
Nguyen, K. C., Alpcan, T., and Başar, T. 2009. Stochastic games for security in networks with interdependent nodes. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets).
[85]
Nisan, N., Ed. 2007. Introduction to mechanism design (for computer scientists). In Proceedings of the Algorithmic Game Theory, Cambridge University Press, Cambridge, U.K., 209--242.
[86]
Nisan, N. and Ronen, A. 1999. Algorithmic mechanism design. In Proceedings of the 31 Annual ACM Symposium on Theory of Computing. 129--140.
[87]
Odlyzko, A. 2003. Privacy, economics, and price discrimination on the Internet. In Proceedings of the 5th ACM International Conference on Electronic Commerce (EC). 355--366.
[88]
Raghavan, T. E. S. and Filar, J. A. 1991. Algorithms for stochastic games -- a survey. Math. Methods Opera. Res. 35, 437--472.
[89]
Raya, M. and Hubaux, J.-P. 2005. The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks. 21.
[90]
Raya, M., Manshaei, M. H., Felegyhazi, M., and Hubaux, J.-P. 2008. Revocation games in ephemeral networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS).
[91]
Raya, M., Shokri, R., and Hubaux, J.-P. 2010. On the tradeoff between trust and privacy in wireless ad hoc networks. In Proceedings of the ACM Conference on Wireless Network Security (WiSec).
[92]
Rehák, M., Pěchouček, M., and Tožička, J. 2005. Adversarial behavior in multi-agent systems. In Proceedings of the Multi-Agent Systems and Applications IV, Lecture Notes in Computer Science, vol. 3690, Springer, 470--479.
[93]
Reidt, S., Srivatsa, M., and Balfe, S. 2009. The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS).
[94]
Saad, W., Han, Z., Başar, T., Debbah, M., and Hjørungnes, A. 2009. Physical layer security: Coalitional games for distributed cooperation. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[95]
Sagduyu, Y., Berry, R., and Ephremides, A. 2009. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets). 130--139.
[96]
Sallhammar, K., Helvik, B., and Knapskog, S. 2006. On stochastic modeling for integrated security and dependability evaluation. J. Netw. 1, 5, 31.
[97]
Schaelicke, L., Slabach, T., Moore, B., and Freeland, C. 2003. Characterizing the performance of network intrusion detection sensors. In Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 2820, Springer, 155--172.
[98]
Semret, N., Liao, R., Campbell, A., and Lazar, A. 2000. Peering and provisioning of differentiated internet services. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).
[99]
Sen, P., Chaki, N., and Chaki, R. 2008. HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. In Proceedings of the Computer Information Systems and Industrial Management Applications (CISIM). 121--126.
[100]
SnortTeam. 2010. Snort users manual. http://www.snort.org, 2.8.6 ed.
[101]
Sommer, P. 2007. Design and analysis of realistic mobility model for wireless mesh networks. M.S. Thesis, ETH Zurich, Switzerland.
[102]
Theodorakopoulos, G. and Baras, J. 2007. Malicious users in unstructured networks. In Proceedings of the 26th Annual IEEE International Conference on Computer Communications (INFOCOM).
[103]
Varian, H. 2009. Economic aspects of personal privacy. In Internet Policy and Economics, Springer, 101--109.
[104]
Vratonjic, N., Manshaei, M., Raya, M., and Hubaux, J.-P. 2010a. ISPs and ad networks against botnet ad fraud. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec).
[105]
Vratonjic, N., Raya, M., Hubaux, J.-P., and Parkes, D. 2010b. Security games in online advertising: Can ads help secure the web? In Proceedings of the Workshop on the Economics of Information Security (WEIS).
[106]
Wasserman, S. and Faust, K. 1994. Social Network Analysis: Methods and Applications. Cambridge Univiversity Press, Cambridge, U.K.
[107]
Weibel, A. and Winterhalter, L. 2005. Bluetella: File sharing for bluetooth enabled mobile phones. M.S. Thesis, Swiss Federal Institute of Technology Zurich (ETHZ), Switzerland.
[108]
Wu, Y., Foo, B., Mei, Y., and Bagchi, S. 2003. Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS. In Proceedings of the 19th Annual Computer Security Applications Conference. 234--244.
[109]
Wyner, A. D. 1975. The wire-tap channel. Bell Syst. Tech. J.
[110]
Yan, Y., El-Atawy, A., and Al-Shaer, E. 2007. Ranking-based optimal resource allocation in peer-to-peer networks. In Proceedings of the 26th Annual IEEE International Conference on Computer Communications (INFOCOM).
[111]
Yegneswaran, V., Barford, P., and Jha, S. 2004. Global intrusion detection in the DOMINO overlay system. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[112]
Yu, W. and Liu, K. J. R. 2007. Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Trans. Mobile Comput. 6, 5, 459--473.
[113]
Zhang, N., Yu, W., Fu, X., and Das, S. K. 2010a. gPath: A game-theoretic path selection algorithm to protect Tor's anonymity. In Proceedings of the 1st Conference on Decision and Game Theory for Security (GameSec), Lecture Notes in Computer Science, vol. 6442, Springer, 58--72.
[114]
Zhang, N., Yu, W., Fu, X., and Das, S. K. 2010b. Maintaining defender's reputation in anomaly detection against insider attacks. IEEE Trans. Syst., Man, Cybernetics, Part B: Cybernetics 40.
[115]
Zhou, C., Karunasekera, S., and Leckie, C. 2005. A peer-to-peer collaborative intrusion detection system. In Proceedings of the International Conference on Networks.
[116]
Zhu, Q. and Başar, T. 2009. Dynamic policy-based IDS configuration. In Proceedings of the 47th IEEE Conference on Decision and Control (CDC).
[117]
Zhu, Q. and Başar, T. 2011a. Indices of power in optimal IDS default configuration: Theory and examples. In Proceedings of the 2nd Conference on Decision and Game Theory (GameSec).
[118]
Zhu, Q. and Başar, T. 2011b. Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference.
[119]
Zhu, Q. and Başar, T. 2011c. Towards a unifying security framework for cyber-physical systems. In Proceedings of the Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11).
[120]
Zhu, Q. and Başar, T. 2012. A Hierarchical Security Architecture for smart grid: From theory to practice. In Proceedings of the Smart Grid Communications and Networking, E. Hossain, Z. Han, and H. V. Poor, Eds., Cambridge University Press, Cambridge, U.K.
[121]
Zhu, Q., Fung, C., Boutaba, R., and Başar, T. 2009. A game-theoretical approach to incentive design in collaborative intrusion detection networks. In Proceedings of the International Conference on Game Theory for Networks (GameNets). 384--392.
[122]
Zhu, Q., Li, H., Han, Z., and Başar, T. 2010. A stochastic game model for jamming in multi-channel cognitive radio systems. In Proceedings of the IEEE International Conference on Communications (ICC).
[123]
Zhu, Q., McQueen, M., Rieger, C., and Başar, T. 2011. Management of control system information security: Control system patch management. In Proceedings of the Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11).
[124]
Zhu, Q., Saad, W., Han, Z., Poor, H. V., and Başar, T. 2011. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of the IEEE (MILCOM).
[125]
Zhu, Q., Tembine, H., and Başar, T. 2010a. Heterogeneous learning in zero-sum stochastic games with incomplete information. In Proceedings of the IEEE Conference on Decisions and Control (CDC).
[126]
Zhu, Q., Tembine, H., and Başar, T. 2010b. Network security configuration: A nonzero-sum stochastic game approach. In Proceedings of the American Control Conference (ACC).
[127]
Zhu, Q., Tembine, H., and Başar, T. 2011. Distributed strategic learning with application to network security. In Proceedings of the American Control Conference (ACC).
[128]
Zonouz, S. A., Khurana, H., Sanders, W. H., and Yardley, T. M. 2009. RRE: A game-theoretic intrusion response and recovery engine. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN).

Cited By

View all
  • (2025)Game-Theoretic Neyman-Pearson Detection to Combat Strategic EvasionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351583420(516-530)Online publication date: 1-Jan-2025
  • (2025)A holistic matrix norm-based alternative solution method for Markov reward gamesApplied Mathematics and Computation10.1016/j.amc.2024.129124488(129124)Online publication date: Mar-2025
  • (2024)Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified PlatformsInformation10.3390/info1512081415:12(814)Online publication date: 18-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 45, Issue 3
June 2013
575 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/2480741
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 July 2013
Accepted: 01 October 2011
Revised: 01 March 2011
Received: 01 September 2010
Published in CSUR Volume 45, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Game theory
  2. cryptography
  3. intrusion detection system
  4. location privacy
  5. multiparty computation
  6. network security and privacy
  7. revocation
  8. wireless security

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)454
  • Downloads (Last 6 weeks)57
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Game-Theoretic Neyman-Pearson Detection to Combat Strategic EvasionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351583420(516-530)Online publication date: 1-Jan-2025
  • (2025)A holistic matrix norm-based alternative solution method for Markov reward gamesApplied Mathematics and Computation10.1016/j.amc.2024.129124488(129124)Online publication date: Mar-2025
  • (2024)Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified PlatformsInformation10.3390/info1512081415:12(814)Online publication date: 18-Dec-2024
  • (2024)Learning Near-Optimal Intrusion Responses Against Dynamic AttackersIEEE Transactions on Network and Service Management10.1109/TNSM.2023.329341321:1(1158-1177)Online publication date: 1-Feb-2024
  • (2024)Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower GamesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339719619(5330-5344)Online publication date: 6-May-2024
  • (2024)On the Structure of Feedback Potential Difference GamesIEEE Transactions on Automatic Control10.1109/TAC.2023.327036769:1(637-644)Online publication date: Jan-2024
  • (2024)A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic NetworkingNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575184(1-5)Online publication date: 6-May-2024
  • (2024)Disentangling Resilience From Robustness: Contextual Dualism, Interactionism, and Game-Theoretic ParadigmsIEEE Control Systems10.1109/MCS.2024.338241544:3(95-103)Online publication date: Jun-2024
  • (2024)Mechanism Design Theory in Control Engineering: A Tutorial and Overview of Applications in Communication, Power Grid, Transportation, and Security SystemsIEEE Control Systems10.1109/MCS.2023.332991944:1(20-45)Online publication date: Feb-2024
  • (2024)Affine Transformation-Based Perfectly Undetectable False Data Injection Attacks on Remote Manipulator Kinematic Control With Attack DetectorIEEE Robotics and Automation Letters10.1109/LRA.2024.34513979:10(8690-8697)Online publication date: Oct-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media