Skip to main content

Overview of Dynamic Network Security Games

  • Chapter
  • First Online:
Dynamic Games for Network Security

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 506 Accesses

Abstract

Due to environmental variations and system fluctuations, the defender often faces a dynamic security competition against the attacker in practice, and two common challenges exist in addressing these dynamic security games: (1) how to deal with the intelligent attacker that may change its strategy based on the deployed defense, and (2) how to properly align the defense strategy with the environmental or system dynamics to achieve the most efficient and effective defense. In literature, the SG framework reviewed in the previous chapter has been considered as a promising mathematical tool to jointly overcome these two challenges and guide the defender towards the best possible defense. In this chapter, a brief survey of the recent efforts in this direction is provided. Specifically, the applications of the SG in addressing security issues in cyber networks, wireless communication networks, and cyber-physical networks are presented, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Sallhammar, B.E. Helvik, S.J. Knapskog, On stochastic modeling for integrated security and dependability evaluation. J. Networks 1(5), 31–42 (2006)

    Article  Google Scholar 

  2. K.W. Lye, J.M. Wing, Game strategies in network security. Int. J. Inf. Secur. 4(1), 71–86 (2005)

    Article  Google Scholar 

  3. J. Filar, K. Vrieze, Competitive Markov Decision Processes (Springer Science & Business Media, Berlin, 2012)

    MATH  Google Scholar 

  4. T. Alpcan, T. Basar, A game theoretic analysis of intrusion detection in access control systems, in IEEE Conference on Decision and Control, vol. 2 (IEEE, New York, 2004), pp. 1568–1573

    Google Scholar 

  5. W. Jiang, Z. Tian, H. Zhang, X. Song, A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision, in IEEE International Conference on Networking, Sensing and Control, 2008 (ICNSC 2008) (IEEE, New York, 2008), pp. 648–653

    Google Scholar 

  6. S.A. Zonouz, H. Khurana, W.H. Sanders, T.M. Yardley, RRE: a game-theoretic intrusion response and recovery engine. IEEE Trans. Parallel Distrib. Syst. 25(2), 395–406 (2014)

    Article  Google Scholar 

  7. Q. Zhu, T. Başar, Dynamic policy-based IDS configuration, in IEEE Conference on Decision and Control (IEEE, New York, 2009), pp. 8600–8605

    Google Scholar 

  8. Q. Zhu, H. Tembine, T. Basar, Network security configurations: a nonzero-sum stochastic game approach. 20(1), 1059–1064 (2010)

    Google Scholar 

  9. D. Shen, G. Chen, E. Blasch, G. Tadda, Adaptive Markov game theoretic data fusion approach for cyber network defense, in IEEE Military Communications Conference (IEEE, New York, 2007), pp. 1–7

    Google Scholar 

  10. D. Fudenberg, D.K. Levine, The Theory of Learning in Games, vol. 2 (MIT, Cambridge, 1998)

    MATH  Google Scholar 

  11. D. Liu, X. Wang, J. Camp, Game-theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastruct. Prot. 1, 75–80 (2008)

    Article  Google Scholar 

  12. K.C. Nguyen, T. Alpcan, T. Basar, Stochastic games for security in networks with interdependent nodes, in ICST International Conference on Game Theory for Networks (2009), pp. 697–703

    Google Scholar 

  13. C. Lin, Y. Wang, Y. Wang, H. Zhu, Q.L. Li, Stochastic game nets and applications in network security. J. Comp. (2011), pp. 461–467

    Google Scholar 

  14. T. Chen, J. Liu, L. Xiao, L. Huang, Anti-jamming transmissions with learning in heterogenous cognitive radio networks, in 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) (IEEE, New York, 2015), pp. 293–298

    Google Scholar 

  15. B.F. Lo, I.F. Akyildiz, Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks, in 2012 IEEE International Conference on Communications (ICC) (IEEE, New York, 2012), pp. 1821–1826

    Google Scholar 

  16. C. Chen, M. Song, C. Xin, J. Backens, A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw. 27(3), 22–27 (2013)

    Article  Google Scholar 

  17. Q. Zhu, H. Li, Z. Han, T. Basar, A stochastic game model for jamming in multi-channel cognitive radio systems, in 2010 IEEE International Conference on Communications (ICC) (IEEE, New York, 2010), pp. 1–6

    Google Scholar 

  18. B. Wang, Y. Wu, K.J.R. Liu, T.C. Clancy, An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 29(4), 877–889 (2011)

    Article  Google Scholar 

  19. Y. Gwon, S. Dastangoo, C. Fossa, H. Kung, Competing mobile network game: embracing antijamming and jamming strategies with reinforcement learning, in 2013 IEEE Conference on Communications and Network Security (CNS) (IEEE, New York, 2013), pp. 28–36

    Google Scholar 

  20. M.L. Littman, Friend-or-foe Q-learning in general-sum games, in ICML, vol. 1 (2001), pp. 322–328

    Google Scholar 

  21. C. Ma, D. Yau, X. Lou, N. Rao, Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans. Power Syst. 28(2), 1676–1686 (2013)

    Article  Google Scholar 

  22. F. Miao, M. Pajic, G.J. Pappas, Stochastic game approach for replay attack detection, in 2013 IEEE 52nd Annual Conference on Decision and Control (CDC) (IEEE, New York, 2013), pp. 1854–1859

    Google Scholar 

  23. M. Aghassi, D. Bertsimas, Robust game theory. Math. Program. 107(1), 231–273 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  24. Q. Zhu, T. Basar, Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35(1), 46–65 (2015)

    Article  MathSciNet  Google Scholar 

  25. S. Liu, P.X. Liu, A. El Saddik, A stochastic game approach to the security issue of networked control systems under jamming attacks. J. Frankl. Inst. 351(9), 4570–4583 (2014)

    Article  MathSciNet  Google Scholar 

  26. Y.W. Law, T. Alpcan, M. Palaniswami, Security games for risk minimization in automatic generation control. IEEE Trans. Power Syst. 30(1), 223–232 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

He, X., Dai, H. (2018). Overview of Dynamic Network Security Games. In: Dynamic Games for Network Security. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75871-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75871-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75870-1

  • Online ISBN: 978-3-319-75871-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics