Network Security Validation Using Game Theory

Author(s):  
Vicky Papadopoulou ◽  
Andreas Gregoriades
Keyword(s):  
2020 ◽  
Vol 309 ◽  
pp. 02012
Author(s):  
Yan Sun ◽  
Weifeng Ji ◽  
Jiang Weng ◽  
Beiying Zhao

Mobile target defense (MTD) is a research hotspot in the field of network security. The decision method of network defense based on game theory is an important technique to guide MTD to make the optimal defense behavior in different network environments (GT-MTD). A lot of related work has been put forward in this field. In this paper, we focus on the scope and field of GT-MTD, systematically introduce the application scenarios of MTD in combination with four different game theory models of classical games (static games, signal games), Markov games, differential games or evolutionary games, and put forward the future development direction. There are some new views and explanations on the research of GT-MTD.


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


2014 ◽  
Vol 687-691 ◽  
pp. 1892-1895
Author(s):  
Shuang Ping Li

With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.


2013 ◽  
Vol 347-350 ◽  
pp. 3971-3974 ◽  
Author(s):  
Heng Xiao ◽  
Cao Fang Long

With the development of network application, network security is facing greater pressure. Based on the characteristics of intrusion detection in the wireless network of the Ad hoc working group, the article introduces the game theory, proposes a game model of network security, concluds the Nash equilibrium in the stage game, repeats game, the pareto Nash equilibrium, more attack both income and payment, so that they get the best choice.


2019 ◽  
Vol 11 (3) ◽  
pp. 65 ◽  
Author(s):  
Yang Li ◽  
Leyi Shi ◽  
Haijie Feng

A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics are capable of deceiving intruders. However, most of their dynamic properties are reflected in the system configuration, rather than the location. Dynamic honeypots are faced with the risk of being identified and avoided. In this paper, we focus on the dynamic locations of honeypots and propose a distributed honeypot scheme. By periodically changing the services, the attacker cannot distinguish the real services from honeypots, and the illegal attack flow can be recognized. We adopt game theory to illustrate the effectiveness of our system. Gambit simulations are conducted to validate our proposed scheme. The game-theoretic reasoning shows that our system comprises an innovative system defense. Further simulation results prove that the proposed scheme improves the server’s payoff and that the attacker tends to abandon launching attacks. Therefore, the proposed distributed honeypot scheme is effective for network security.


Author(s):  
Sankardas Roy ◽  
Charles Ellis ◽  
Sajjan Shiva ◽  
Dipankar Dasgupta ◽  
Vivek Shandilya ◽  
...  
Keyword(s):  

2013 ◽  
Vol 15 (1) ◽  
pp. 472-486 ◽  
Author(s):  
Xiannuan Liang ◽  
Yang Xiao
Keyword(s):  

2011 ◽  
Vol 181-182 ◽  
pp. 799-803
Author(s):  
Yan Li Xu ◽  
Ling Ling Wang

to strengthen the network security and to enhance the accuracy of the network security risk assessment, the essay conducts game analysis to the security system of protective mechanisms. Using the basic theory of games and the analytical and comparative method, and raising the network security and physical model for the security system, this process will protect and improve the network security. At the aspect of setting the model, we did not rely on the traditional game theory, but creatively set behavior of the game for a large number of players for the limit logos of groups in the model, and paid more attention to the detection system to reach a state of stability. Analysis shows that the proposed models and the method are feasible and effective.


IJARCCE ◽  
2015 ◽  
pp. 40-45
Author(s):  
Shyam Chandran P ◽  
Resmi .A.M
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document