메뉴 건너뛰기




Volumn 15, Issue 1, 2013, Pages 472-486

Game theory for network security

Author keywords

Attack defense; Game theory; Network security; Security assessment

Indexed keywords

APPLICATION SCENARIO; ATTACK-DEFENSE; COOPERATIVE GAME; FUTURE RESEARCH DIRECTIONS; GAME MODELS; GAME-THEORETIC; INFORMATION ACCESS; NETWORK ATTACK; NETWORK RESOURCE; NETWORK SECURITY PROBLEMS; NONCOOPERATIVE GAME; SECURITY ASSESSMENT; SECURITY ISSUES; SECURITY MEASUREMENT; STATE OF THE ART;

EID: 84873690107     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2012.062612.00056     Document Type: Article
Times cited : (276)

References (80)
  • 5
    • 14344257107 scopus 로고    scopus 로고
    • A game theoretic analysis of intrusion detection in access control systems
    • WeA05.6, 2004 43rd IEEE Conference on Decision and Control (CDC)
    • T. Alpcan and T. Baser, "A game theoretic analysis of intrusion detection in access control systems," Proc. 43rd IEEE Conference on Decision and Control, Vol. 2, pp. 1568-1573,2004. (Pubitemid 40291179)
    • (2004) Proceedings of the IEEE Conference on Decision and Control , vol.2 , pp. 1568-1573
    • Alpcan, T.1    Basar, T.2
  • 6
    • 39649111300 scopus 로고    scopus 로고
    • Intrusion response as a resource allocation problem
    • 4177356, Proceedings of the 45th IEEE Conference on Decision and Control 2006, CDC
    • M. Bloem, T. Alpcan, and T. Basar, "Intrusion response as a resource allocation problem,". IEEE Conference on Descision and Control, pp. 6283-6288, 2006. (Pubitemid 351283649)
    • (2006) Proceedings of the IEEE Conference on Decision and Control , pp. 6283-6288
    • Bloem, M.1    Alpcan, T.2    Basar, T.3
  • 7
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attacks and network defense policies in wireless sensor networks
    • DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," In Proc. IEEE International Conference on Computer Communications (INFOCOM), pp. 1307 - 1315, 2007. (Pubitemid 47334355)
    • (2007) Proceedings - IEEE INFOCOM , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 12
    • 0004260006 scopus 로고    scopus 로고
    • Academic Press, 3rd edition
    • G. Owen, Game Theory. Academic Press, 3rd edition, 2001.
    • (2001) Game Theory.
    • Owen, G.1
  • 17
    • 77951754388 scopus 로고    scopus 로고
    • Modelling information warfare as a game
    • J. Jormakka and J. V. E. Molsa, "Modelling information warfare as a game," Journal of Information Warfare, Vol. 4(2), pp. 12-25, 2005.
    • (2005) Journal of Information Warfare , vol.4 , Issue.2 , pp. 12-25
    • Jormakka, J.1    Molsa, J.V.E.2
  • 19
    • 67649521992 scopus 로고    scopus 로고
    • A game theoreticcal framework on intrusion detection in heterogeneous networks
    • June
    • L. Chen and J. Leneutre, "A game theoreticcal framework on intrusion detection in heterogeneous networks," IEEE Trans. Inf. Forens. Security, Vol. 4, No. 2, pp. 165-178, June 2009.
    • (2009) IEEE Trans. Inf. Forens. Security , vol.4 , Issue.2 , pp. 165-178
    • Chen, L.1    Leneutre, J.2
  • 20
    • 76949106169 scopus 로고    scopus 로고
    • A Puzzle-based defense strategy against flooding attacks using game theory
    • M. Fallah, "A Puzzle-based defense strategy against flooding attacks using game theory," IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, pp. 5-19, 2010.
    • (2010) IEEE Transactions on Dependable and Secure Computing , vol.7 , Issue.1 , pp. 5-19
    • Fallah, M.1
  • 21
    • 14844293542 scopus 로고    scopus 로고
    • Game strategies in network security
    • DOI 10.1007/s10207-004-0060-x
    • K. Lye and J. Wing, "Game strategies in network security," International Journal of Information Security, Vol. 4, No. 1-2, pp. 71-86, 2005. (Pubitemid 40347202)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 71-86
    • Lye, K.-W.1    Wing, J.M.2
  • 25
    • 49949092806 scopus 로고    scopus 로고
    • Cybersecurity strategies: The QuERIES methodology
    • L. Carin, G. Cybenko, and J. Hughes, "Cybersecurity strategies: the QuERIES methodology," IEEE Computer, Vol. 41, Issue 8, pp. 20-26, 2008.
    • (2008) IEEE Computer , vol.41 , Issue.8 , pp. 20-26
    • Carin, L.1    Cybenko, G.2    Hughes, J.3
  • 26
    • 60449090394 scopus 로고    scopus 로고
    • On stochastic modeling for integrated security and dependability evaluation
    • September
    • K. Sallhammar, B. Helvik, and S. Knapskog, "On stochastic modeling for integrated security and dependability evaluation," Journal of Networks, Vol. 1, No. 5, pp. 31-42, September 2006.
    • (2006) Journal of Networks , vol.1 , Issue.5 , pp. 31-42
    • Sallhammar, K.1    Helvik, B.2    Knapskog, S.3
  • 28
    • 0014873273 scopus 로고
    • Markov approach to finding failure times of repairable systems
    • November
    • John A. Buzacot, "Markov approach to finding failure times of repairable systems" IEEE Trans. Reliab., Vol. R-19, Issue 4, pp. 128- 134, November 1970.
    • (1970) IEEE Trans. Reliab. , vol.19 , Issue.4 , pp. 128-134
    • Buzacot John, A.1
  • 33
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • DOI 10.1145/1053283.1053288
    • P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," ACM Trans. Information and System Security (TISSEC), Vol. 8, Issue 1, pp. 78-118, 2005. (Pubitemid 40479430)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 41
    • 21344494344 scopus 로고
    • How to analyse the results of linear program- part 3: Infeasibility diagnoses
    • H. Greenberg.,"How to analyse the results of linear program- part 3: infeasibility diagnoses," interfaces, Vol. 23, No. 6, pp. 120-139, 1993.
    • (1993) Interfaces , vol.23 , Issue.6 , pp. 120-139
    • Greenberg, H.1
  • 47
    • 79955481246 scopus 로고    scopus 로고
    • How bad are selfish Investments in network security?
    • L. Jiang and V. Anantharam, "How bad are selfish Investments in network security?" IEEE/ACM Trans. Netw., Vol. 19, No. 2, pp. 549- 560, 2011.
    • (2011) IEEE/ACM Trans. Netw. , vol.19 , Issue.2 , pp. 549-560
    • Jiang, L.1    Anantharam, V.2
  • 48
    • 80051717392 scopus 로고    scopus 로고
    • Jamming games in wireless networks with incomplete information
    • Y. Sagduyu, R. Berry and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Commun. Mag., Vol. 49, Issue 8, pp. 112-118, 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.8 , pp. 112-118
    • Sagduyu, Y.1    Berry, R.2    Ephremides, A.3
  • 49
    • 16244381482 scopus 로고    scopus 로고
    • Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
    • DOI 10.1109/TAC.2005.843878
    • J. S. Shamma and G. Arslan, "Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria," IEEE Trans. Autom. Control, Vol. 50, No. 3, pp. 312-327, Mar. 2005. (Pubitemid 40448583)
    • (2005) IEEE Transactions on Automatic Control , vol.50 , Issue.3 , pp. 312-327
    • Shamma, J.S.1    Arslan, G.2
  • 52
    • 84857178198 scopus 로고    scopus 로고
    • ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
    • M. Barua, X. Liang, R. Lu, X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, " International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 67-76.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 67-76
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 54
    • 84857155268 scopus 로고    scopus 로고
    • Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks
    • M. J. Sharma and V. C. M. Leung, "Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 90-100.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 90-100
    • Sharma, M.J.1    Leung, V.C.M.2
  • 55
    • 84857145254 scopus 로고    scopus 로고
    • Rendezvous based trust propagation to enhance distributed network security
    • N. Cheng, K. Govindan, and P. Mohapatra, "Rendezvous Based Trust Propagation to Enhance Distributed Network Security," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 101-111.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 101-111
    • Cheng, N.1    Govindan, K.2    Mohapatra, P.3
  • 59
    • 84857163085 scopus 로고    scopus 로고
    • Partial iris recognition as a viable biometric scheme
    • D. Walker and S. Latifi, "Partial Iris Recognition as a Viable Biometric Scheme," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 147-152.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 147-152
    • Walker, D.1    Latifi, S.2
  • 60
    • 84857177856 scopus 로고    scopus 로고
    • Edustega: An education-centric steganography methodology
    • A. Desoky, "Edustega: An Education-Centric Steganography Methodology," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 153-173.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 153-173
    • Desoky, A.1
  • 61
    • 84857176805 scopus 로고    scopus 로고
    • An intrusion detection technique based on continuous binary communication channels
    • N. Ampah, C. Akujuobi, S. Alam, and M. Sadiku, "An intrusion detection technique based on continuous binary communication channels," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 174-180.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 174-180
    • Ampah, N.1    Akujuobi, C.2    Alam, S.3    Sadiku, M.4
  • 63
    • 84857202234 scopus 로고    scopus 로고
    • On the (in) security of two Joint Encryption and Error Correction schemes
    • Q. Chai and G. Gong, "On the (in) security of two Joint Encryption and Error Correction schemes," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 191 - 200.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.4 , pp. 191-200
    • Chai, Q.1    Gong, G.2
  • 64
    • 84863170280 scopus 로고    scopus 로고
    • An epidemic model with adaptive virus spread control for Wireless Sensor Networks
    • S. Tang and W. Li, "An epidemic model with adaptive virus spread control for Wireless Sensor Networks," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 201 - 210.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.4 , pp. 201-210
    • Tang, S.1    Li, W.2
  • 66
    • 84863150088 scopus 로고    scopus 로고
    • Friendship-based location privacy in Mobile Social Networks
    • W. Chang, J. Wu, and C. C. Tan, "Friendship-based location privacy in Mobile Social Networks," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 226 - 236.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.4 , pp. 226-236
    • Chang, W.1    Wu, J.2    Tan, C.C.3
  • 67
  • 68
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing security using mobility-based anomaly detection in cellular mobile networks
    • DOI 10.1109/TVT.2006.874579
    • B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Trans. Veh. Technol., Vol. 55, No. 4, July 2006, pp.1385-1396. (Pubitemid 44111432)
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 69
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • DOI 10.1109/MWC.2007.4396943
    • B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Commun. Mag., Special Issue on Security in Wireless Mobile Ad Hoc and Sensor Networks, Oct. 2007, pp. 56-63. (Pubitemid 350231654)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Xiao, Y.3    Guizani, S.4
  • 70
    • 34250761381 scopus 로고    scopus 로고
    • Integration of mobility and intrusion detection for wireless ad hoc networks
    • DOI 10.1002/dac.853
    • B. Sun, K. Wu, Y. Xiao, and R. Wang, "Integration of mobility and intrusion detection for wireless Ad Hoc networks," (Wiley) International Journal of Communication Systems, Vol. 20, No. 6, pp. 695-721, Jun. 2007. (Pubitemid 46959707)
    • (2007) International Journal of Communication Systems , vol.20 , Issue.6 , pp. 695-721
    • Sun, B.1    Wu, K.2    Xiao, Y.3    Wang, R.4
  • 71
    • 36749008467 scopus 로고    scopus 로고
    • Detection of fraudulent usage in wireless networks
    • DOI 10.1109/TVT.2007.901875
    • B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Trans. Veh. Technol., Vol. 56, No.6, Nov. 2007, pp. 3912 - 3923. (Pubitemid 350201083)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.II6 , pp. 3912-3923
    • Sun, B.1    Xiao, Y.2    Wang, R.3
  • 72
    • 84873692516 scopus 로고    scopus 로고
    • Wireless Network Security, Springer, ISBN-10 0-387- 28040-5, ISBN-13 978-0-387-28040-5, Chapter 8
    • B. Sun, Y. Xiao, and K. Wu, "Intrusion Detection in Cellular Mobile Networks," Wireless Network Security, Springer, 2007, ISBN-10 0-387- 28040-5, ISBN-13 978-0-387-28040-5, Chapter 8, pp. 183-210.
    • (2007) Intrusion Detection in Cellular Mobile Networks , pp. 183-210
    • Sun, B.1    Xiao, Y.2    Wu, K.3
  • 73
    • 55349125312 scopus 로고    scopus 로고
    • Vertical and horizontal synchronization services with outlier detection in underwater sensor networks
    • John Wiley & Sons, Nov
    • F. Hu, Y. Malkawi, S. Kumar, and Y. Xiao, "Vertical and Horizontal Synchronization Services with Outlier Detection in Underwater Sensor Networks," (Wiley) Wireless Communications and Mobile Computing (WCMC), John Wiley & Sons, Vol. 8, No. 9, Nov. 2008, pp. 1165 - 1181.
    • (2008) (Wiley) Wireless Communications and Mobile Computing (WCMC) , vol.8 , Issue.9 , pp. 1165-1181
    • Hu, F.1    Malkawi, Y.2    Kumar, S.3    Xiao, Y.4
  • 75
    • 50949125328 scopus 로고    scopus 로고
    • Enhancing security using mobility profile for wireless networks
    • B. Sun, X. Jin, Y. Xiao, and R. Wang, "Enhancing Security using Mobility Profile for Wireless Networks," Proc. GLOBECOM 2006.
    • Proc. GLOBECOM 2006
    • Sun, B.1    Jin, X.2    Xiao, Y.3    Wang, R.4
  • 76
    • 50949124171 scopus 로고    scopus 로고
    • Enhancing security using calling activity for wireless networks
    • B. Sun, Y. Xiao, R. Wang, and S. Guizani, "Enhancing Security using Calling Activity for Wireless Networks," Proc. GLOBECOM 2006.
    • (2006) Proc. GLOBECOM
    • Sun, B.1    Xiao, Y.2    Wang, R.3    Guizani, S.4
  • 77
    • 39349092398 scopus 로고    scopus 로고
    • Change-point monitoring for secure in-network aggregation in wireless sensor networks
    • DOI 10.1109/GLOCOM.2007.180, 4411090, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
    • B. Sun, N. Chand, K. Wu, and Y. Xiao, "Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks," Proc. IEEE GLOBECOM 2007, pp. 936-940. (Pubitemid 351259168)
    • (2007) GLOBECOM - IEEE Global Telecommunications Conference , pp. 936-940
    • Sun, B.1    Chand, N.2    Wu, K.3    Xiao, Y.4
  • 78
    • 38549091210 scopus 로고    scopus 로고
    • Integration of secure in-network aggregation and system monitoring for Wireless Sensor Networks
    • DOI 10.1109/ICC.2007.246, 4288917, 2007 IEEE International Conference on Communications, ICC'07
    • B. Sun, X. Jin, K. Wu, and Y. Xiao, "Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks," Proc. IEEE ICC 2007, pp. 1466- 1471. (Pubitemid 351145742)
    • (2007) IEEE International Conference on Communications , pp. 1466-1471
    • Sun, B.1    Jin, X.2    Wu, K.3    Xiao, Y.4
  • 79
    • 76349095151 scopus 로고    scopus 로고
    • Bio-inspired true coalition formation on intrusion detection by mobile robots
    • X. Liang and Y. Xiao, "Bio-inspired True Coalition Formation on Intrusion Detection by Mobile Robots," Proc. CollaborateCom09.
    • Proc. CollaborateCom09
    • Liang, X.1    Xiao, Y.2
  • 80
    • 77952582720 scopus 로고    scopus 로고
    • Studying bio-inspired coalition formation of robots for detecting intrusions using game theory
    • June
    • X. Liang and Y Xiao, "Studying Bio-inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory," IEEE Trans. Syst. Man Cybern., Part B, Special Issue on Game Theory, Vol. 40, No. 3, June 2010, pp. 683-693.
    • (2010) IEEE Trans. Syst. Man Cybern., Part B, Special Issue on Game Theory , vol.40 , Issue.3 , pp. 683-693
    • Liang, X.1    Xiao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.