Security

Game Theory for Cyber Security

Free registration required

Executive Summary

While there are significant advances in information technology and infrastructure which offer new opportunities, cyberspace is still far from completely secured. In many cases, the employed security solutions are ad hoc and lack a quantitative decision framework. While they are effective in solving the particular problems they are designed for, they generally fail to respond well in a dynamically changing scenario. To this end, the authors propose a holistic security approach in this paper. They find that game theory provides huge potential to place such an approach on a solid analytical setting. The authors consider the interaction between the attacks and the defense mechanisms as a game played between the attacker and the defender (system administrator).

  • Format: PDF
  • Size: 333 KB