1 / 3

Game Theory Models for Network Security

4 th Mathematics of Networks Workshop at QMUL London 22 nd July 2005. Game Theory Models for Network Security. Carla Di Cairano-Gilfedder, BT. ______________________________. Overview. Abstract Game Theory is a discipline concerned with the study of interactions between two or

kalyca
Download Presentation

Game Theory Models for Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 4th Mathematics of Networks Workshop at QMUL London 22nd July 2005 Game Theory Models for Network Security Carla Di Cairano-Gilfedder, BT

  2. ______________________________ Overview Abstract Game Theory is a discipline concerned with the study of interactions between two or more entities with conflicting or mixed interests. It has successfully and extensively been applied in several fields including mathematics, economics, social sciences, decision theory, and behavioural sciences. In the last few years, Game Theory has also attracted the attention of Security researchers aiming to develop quantitative analysis techniques for Network and Information Security. For them it provides a natural vehicle for a rigorous formulation of attacks, threat analysis, and reactive decision making. This presentation provides an overview of some of the proposed models in the sub-fields of Intrusion Detection, Interdependent Security, and Information Warfare. • Intrusion Detection in Access Control • Interdependent security • Information Warfare

  3. The presentation provided an overview of following models Intrusion Detection as a zero-sum gameA Game Theoretic Analysis of Intrusion Detection In Access Control Systems,T. Alpcan and T. Basar, University Illinois at Urbana-Champaign in Proc. of 43rd IEEE CDC, Dec. 2004 _______________________________ Interdependent securityH. Kunreuther, Univ. PennsylvaniaG. Heal, Columbia University Journal of Risk and Uncertainty, 2002 _______________________________ A game theory model of Information WarfareD. Burke, USAF Air Force Institute of Technology,Air University, Master of Science, 1999 _______________________________ Computer network security as a stochastic non-zero-sum gameGame strategies in network security, by K. Lye and J. Wing, Carnagie Mellon University, Int. Journal Inf. Security 2005

More Related