Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium |
Liu, Liang
(College of Cybersecurity, Sichuan University)
Huang, Cheng (College of Cybersecurity, Sichuan University) Fang, Yong (College of Cybersecurity, Sichuan University) Wang, Zhenxue (College of Electronics and Information Engineering, Sichuan University) |
1 | Durkota K, Lisy V, Kiekintveld C, et al., "Game-theoretic algorithms for optimal network security hardening using attack graphs," in Proc. of the 2015 International Conference on Autonomous Agents and Multiagent Systems, International Foundation for Autonomous Agents and Multiagent Systems, Istanbul, ACM, 1773-1774, 2015. |
2 | Bedi H S, Roy S, Shiva S, "Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows," in Proc. of 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Paris, IEEE, 129-136, 2011. |
3 | Sandberg H, Amin S, Johansson K H, "Cyber-physical security in networked control systems: An introduction to the issue," IEEE Control Systems, 35(1), 20-23, 2015. DOI |
4 | Roy S, Ellis C, Shiva S, et al., "A survey of game theory as applied to network security," in Proc. of 2010 43rd Hawaii International Conference on System Sciences, Honolulu, IEEE, 1-10, 2010. |
5 | Sedjelmaci H, Senouci S M, Ansari N, "Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology," IEEE Transactions on Intelligent Transportation Systems, 18(5), 1143-1153, 2017. DOI |
6 | Nguyen T H, Wright M, Wellman M P, et al., "Multi-stage attack graph security games: heuristic strategies, with empirical game-theoretic analysis," in Proc. of the 2017 Workshop on Moving Target Defense, Dallas, ACM, 87-97, 2017. |
7 | Wei J, Binxing F, Zhihong T, etc, "Evaluating Network Security and Optimal Active Defense Based on Attack-Denfense Game Model," Chinese Journal of Computers, 32(4), 817-827, 2009. DOI |
8 | Rass S, König S, Schauer S, "Defending against advanced persistent threats using game-theory," PloS one, 12(1), e0168675, 2017. DOI |
9 | Zhu J, Zhao B, Zhu Z, "Leveraging game theory to achieve efficient attack-aware service provisioning in EONs," Journal of Lightwave Technology, 35(10), 1785-1796, 2017. DOI |
10 | Weiheng Zh, TAO L, "Optimal Active Defense Based on Multi-stage Attack-Defense Signaling Game," Chinese Journal of Electronics, 45(2), 431-439, 2017. |
11 | Wei J, Bingxing F, Zhi-hong T, "Research on defense strategies selection based on attack-defense stochastic game model," Journal of Computer Research and Development, 47(10), 1714-1723, 2010. |
12 | Lye K, Wing J M, "Game strategies in network security," International Journal of Information Security, 4(1-2), 71-86, 2005. DOI |
13 | Wei L, Sarwat A I, Saad W, et al., "Stochastic games for power grid protection against coordinated cyber-physical attacks," IEEE Transactions on Smart Grid, 9(2), 684-694, 2018. DOI |
14 | Lei C, Zhang H Q, Wan L M, et al., "Incomplete information Markov game theoretic approach to strategy generation for moving target defense," Computer Communications, 116, 184-199, 2018. DOI |
15 | Chaoyuan Y, Decision theory and methods, Science Press, Bejing, 2006. |
16 | Kenneth Geers, Strategic cyberspace security, CCD COE Publication, Estonia, 2015.1. |
17 | Hongsheng G, Cyberspace Security Strategy, Aviation Industry Press, Beijing, 2016 |
18 | Zhenxue W, Anming Z, Yong F, Xiaocong O, Information System Security Risk Estimation and Control Theory, Science Press, Beijing, 2011. |
19 | Dingpi H, Introduction to Game Theory, China University of Science and Technology Press, Hefei, 2004. |
20 | Weijin Zh, Game Theory and Information Economics, Truth & Wisdom Press, Shanghai Joint Publishing Press, Shanghai People's Publishing House, Shanghai, 2016. |
21 | Aumann R J, "Game theory," The New Palgrave Dictionary of Economics, 2017. |
22 | Liang X, Xiao Y., "Game theory for network security," IEEE Communications Surveys & Tutorials, 15(1), 472-486, 2013. DOI |
23 | Liu Y, Comaniciu C, Man H, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. of the 2006 workshop on Game theory for communications and networks, Pisa, ACM, 4, 2006. |
24 | Esmalifalak M, Shi G, Han Z, et al., "Bad data injection attack and defense in electricity market using game theory study," IEEE Transactions on Smart Grid, 4(1), 160-169, 2013. DOI |
25 | Do C T, Tran N H, Hong C, et al., "Game theory for cyber security and privacy," ACM Computing Surveys (CSUR), 50(2), 30, 2017. |