Abstract
Game theory provides a mature mathematical foundation for making security decisions in a principled manner. Security games help formalizing security problems and decisions using quantitative models. The resulting analytical frameworks lead to better allocation of limited resources and result in more informed responses to security problems in complex systems and organizations. The game-theoretic approach to security is applicable to a wide variety of cyberphysical systems and critical infrastructures such as electrical power systems, financial services, transportation, data centers, and communication networks.
Bibliography
Alpcan T, BaÅŸar T (2011) Network security: a decision and game theoretic approach. Cambridge University Press. http://www.tansu.alpcan.org/book.php
Altman E, Başar T, Kavitha V (2010) Adversarial control in a delay tolerant network. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 87–106. https://doi.org/10.1007/978-3-642-17197-0_6
Buttyan L, Hubaux JP (2008) Security and cooperation in wireless networks. Cambridge University Press, Cambridge. http://secowinet.epfl.ch
Chorppath AK, Alpcan T (2011) Adversarial behavior in network mechanism design. In: Proceedings of 4th International workshop on game theory in communication networks (Gamecomm). ENS, Cachan
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F (2014) Game theory meets information security management. In: IFIP international information security conference. Springer, pp 15–29
Gueye A, Walrand J, Anantharam V (2010) Design of network topology in an adversarial environment. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 1–20. https://doi.org/10.1007/978-3-642-17197-0_1
Guikema SD (2009) Game theory models of intelligent actors in reliability analysis: an overview of the state of the art. In: Game theoretic risk analysis of security threats. Springer, pp 1–19. https://doi.org/10.1007/978-0-387-87767-9
Han Y, Chan J, Alpcan T, Leckie C (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108. https://doi.org/10.1109/TDSC.2015.2429132
Kantarcioglu M, Bensoussan A, Hoe S (2011) Investment in privacy-preserving technologies under uncertainty. In: Baras J, Katz J, Altman E (eds) Decision and game theory for security. Lecture notes in computer science, vol 7037. Springer, Berlin/Heidelberg, pp 219–238. https://doi.org/10.1007/978-3-642-25280-8_17
Kashyap A, Başar T, Srikant R (2004) Correlated jamming on MIMO Gaussian fading channels. IEEE Trans Inf Theory 50(9):2119–2123. https://doi.org/10.1109/TIT.2004.833358
Kodialam M, Lakshman TV (2003) Detecting network intrusions via sampling: a game theoretic approach. In: Proceedings of 22nd IEEE conference on computer communications (Infocom), San Fransisco, vol 3, pp 1880–1889
Law YW, Alpcan T, Palaniswami M (2012) Security games for voltage control in smart grid. In: 2012 50th annual Allerton conference on communication, control, and computing (Allerton), pp 212–219. https://doi.org/10.1109/Allerton.2012.6483220
Manshaei MH, Zhu Q, Alpcan T, Başar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):25:1–25:39. https://doi.org/10.1145/2480741.2480742
Miura-Ko RA, Yolken B, Bambos N, Mitchell J (2008) Security investment games of interdependent organizations. In: 46th annual Allerton conference
Mounzer J, Alpcan T, Bambos N (2010) Dynamic control and mitigation of interdependent IT security risks. In: Proceedings of the IEEE conference on communication (ICC). IEEE Communications Society
Pita J, Jain M, Ordónez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2009) Using game theory for Los Angeles airport security. AI Mag 30(1):43–43
Roth A (2008) The price of malice in linear congestion games. In: WINE’08: proceedings of the 4th international workshop on internet and network economics, pp 118–125
Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press. http://books.google.com.au/books?id=hjjkJ7u209YC
Zander J (1990) Jamming games in slotted Aloha packet radio networks. In: IEEE military communications conference (MILCOM), vol 2, pp 830–834. https://doi.org/10.1109/MILCOM.1990.117531
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2019 Springer-Verlag London Ltd., part of Springer Nature
About this entry
Cite this entry
Alpcan, T. (2019). Game Theory for Security. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, London. https://doi.org/10.1007/978-1-4471-5102-9_37-2
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-2
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5102-9
Online ISBN: 978-1-4471-5102-9
eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering
Publish with us
Chapter history
-
Latest
Game Theory for Security- Published:
- 10 September 2019
DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-2
-
Original
Game Theory for Security- Published:
- 28 February 2014
DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-1