Game Theory in Cyber Security Defence

被引:0
|
作者
Patrascu, Alecsandru [1 ]
Simion, Emil [1 ]
机构
[1] Adv Technol Inst, Bucharest, Romania
关键词
cyber security; cryptography; steganography; critical infrastructure; industrial control systems; car viruses; information warfare; malware;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kind of attacks by using elements of modern game theory. We will present the effects and benefits of game theory and we will talk about a defense exercise model that can be used to train cyber response specialists.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [2] Game Theory with Learning for Cyber Security Monitoring
    Chung, Keywhan
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2016, : 1 - 8
  • [3] Automating Cyber Defence Responses Using Attack-Defence Trees and Game Theory
    Jhawar, Ravi
    Mauw, Sjouke
    Zakiuddin, Irfan
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 163 - 172
  • [4] The "Triptych of Cyber Security": A Classification of Active Cyber Defence
    Dewar, Robert S.
    2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 7 - 21
  • [5] Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices
    Oyelami, Julius Olusegun
    Kassim, Azleena Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 131 - 138
  • [6] Risk Assessment for Cyber Security of Manufacturing Systems: A Game Theory Approach
    Zarreha, Alireza
    Wan, HungDa
    Lee, Looneun
    Saygin, Can
    Al Janahi, Rafid
    29TH INTERNATIONAL CONFERENCE ON FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING (FAIM 2019): BEYOND INDUSTRY 4.0: INDUSTRIAL ADVANCES, ENGINEERING EDUCATION AND INTELLIGENT MANUFACTURING, 2019, 38 : 605 - 612
  • [7] A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing
    Kakkad, Vishruti
    Shah, Hitarth
    Patel, Reema
    Doshi, Nishant
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 680 - 685
  • [8] Cyber Security and the 2016 Defence White Paper
    Scully, Tim
    SECURITY CHALLENGES, 2016, 12 (01) : 115 - 126
  • [9] SECURITY GAME FOR CYBER PHYSICAL SYSTEMS
    Hasan, Kamrul
    Shetty, Sachin
    Sokolowski, John
    Tosh, Deepak K.
    COMMUNICATIONS AND NETWORKING SYMPOSIUM (CNS 2018), 2018,
  • [10] Cybercrime in Ukraine and the Cyber Security Game
    Mazepa, Svitlana
    Dostalek, Libor
    Krivan, Vlastimil
    Banakh, Serhiy
    2020 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT), 2020, : 787 - 790