Abstract
Due to environmental variations and system fluctuations, the defender often faces a dynamic security competition against the attacker in practice, and two common challenges exist in addressing these dynamic security games: (1) how to deal with the intelligent attacker that may change its strategy based on the deployed defense, and (2) how to properly align the defense strategy with the environmental or system dynamics to achieve the most efficient and effective defense. In literature, the SG framework reviewed in the previous chapter has been considered as a promising mathematical tool to jointly overcome these two challenges and guide the defender towards the best possible defense. In this chapter, a brief survey of the recent efforts in this direction is provided. Specifically, the applications of the SG in addressing security issues in cyber networks, wireless communication networks, and cyber-physical networks are presented, respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Sallhammar, B.E. Helvik, S.J. Knapskog, On stochastic modeling for integrated security and dependability evaluation. J. Networks 1(5), 31–42 (2006)
K.W. Lye, J.M. Wing, Game strategies in network security. Int. J. Inf. Secur. 4(1), 71–86 (2005)
J. Filar, K. Vrieze, Competitive Markov Decision Processes (Springer Science & Business Media, Berlin, 2012)
T. Alpcan, T. Basar, A game theoretic analysis of intrusion detection in access control systems, in IEEE Conference on Decision and Control, vol. 2 (IEEE, New York, 2004), pp. 1568–1573
W. Jiang, Z. Tian, H. Zhang, X. Song, A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision, in IEEE International Conference on Networking, Sensing and Control, 2008 (ICNSC 2008) (IEEE, New York, 2008), pp. 648–653
S.A. Zonouz, H. Khurana, W.H. Sanders, T.M. Yardley, RRE: a game-theoretic intrusion response and recovery engine. IEEE Trans. Parallel Distrib. Syst. 25(2), 395–406 (2014)
Q. Zhu, T. Başar, Dynamic policy-based IDS configuration, in IEEE Conference on Decision and Control (IEEE, New York, 2009), pp. 8600–8605
Q. Zhu, H. Tembine, T. Basar, Network security configurations: a nonzero-sum stochastic game approach. 20(1), 1059–1064 (2010)
D. Shen, G. Chen, E. Blasch, G. Tadda, Adaptive Markov game theoretic data fusion approach for cyber network defense, in IEEE Military Communications Conference (IEEE, New York, 2007), pp. 1–7
D. Fudenberg, D.K. Levine, The Theory of Learning in Games, vol. 2 (MIT, Cambridge, 1998)
D. Liu, X. Wang, J. Camp, Game-theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastruct. Prot. 1, 75–80 (2008)
K.C. Nguyen, T. Alpcan, T. Basar, Stochastic games for security in networks with interdependent nodes, in ICST International Conference on Game Theory for Networks (2009), pp. 697–703
C. Lin, Y. Wang, Y. Wang, H. Zhu, Q.L. Li, Stochastic game nets and applications in network security. J. Comp. (2011), pp. 461–467
T. Chen, J. Liu, L. Xiao, L. Huang, Anti-jamming transmissions with learning in heterogenous cognitive radio networks, in 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) (IEEE, New York, 2015), pp. 293–298
B.F. Lo, I.F. Akyildiz, Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks, in 2012 IEEE International Conference on Communications (ICC) (IEEE, New York, 2012), pp. 1821–1826
C. Chen, M. Song, C. Xin, J. Backens, A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw. 27(3), 22–27 (2013)
Q. Zhu, H. Li, Z. Han, T. Basar, A stochastic game model for jamming in multi-channel cognitive radio systems, in 2010 IEEE International Conference on Communications (ICC) (IEEE, New York, 2010), pp. 1–6
B. Wang, Y. Wu, K.J.R. Liu, T.C. Clancy, An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29(4), 877–889 (2011)
Y. Gwon, S. Dastangoo, C. Fossa, H. Kung, Competing mobile network game: embracing antijamming and jamming strategies with reinforcement learning, in 2013 IEEE Conference on Communications and Network Security (CNS) (IEEE, New York, 2013), pp. 28–36
M.L. Littman, Friend-or-foe Q-learning in general-sum games, in ICML, vol. 1 (2001), pp. 322–328
C. Ma, D. Yau, X. Lou, N. Rao, Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans. Power Syst. 28(2), 1676–1686 (2013)
F. Miao, M. Pajic, G.J. Pappas, Stochastic game approach for replay attack detection, in 2013 IEEE 52nd Annual Conference on Decision and Control (CDC) (IEEE, New York, 2013), pp. 1854–1859
M. Aghassi, D. Bertsimas, Robust game theory. Math. Program. 107(1), 231–273 (2006)
Q. Zhu, T. Basar, Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35(1), 46–65 (2015)
S. Liu, P.X. Liu, A. El Saddik, A stochastic game approach to the security issue of networked control systems under jamming attacks. J. Frankl. Inst. 351(9), 4570–4583 (2014)
Y.W. Law, T. Alpcan, M. Palaniswami, Security games for risk minimization in automatic generation control. IEEE Trans. Power Syst. 30(1), 223–232 (2015)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
He, X., Dai, H. (2018). Overview of Dynamic Network Security Games. In: Dynamic Games for Network Security. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75871-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-75871-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75870-1
Online ISBN: 978-3-319-75871-8
eBook Packages: EngineeringEngineering (R0)