全面洞察博弈论与网络安全的关系

F. Anwar, B. Khan, R. F. Olanrewaju, Bisma Rasool Pampori, R. N. Mir
{"title":"全面洞察博弈论与网络安全的关系","authors":"F. Anwar, B. Khan, R. F. Olanrewaju, Bisma Rasool Pampori, R. N. Mir","doi":"10.11591/IJEEI.V8I1.1810","DOIUrl":null,"url":null,"abstract":"The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A Comprehensive Insight into Game Theory in relevance to Cyber\\n Security\",\"authors\":\"F. Anwar, B. Khan, R. F. Olanrewaju, Bisma Rasool Pampori, R. N. Mir\",\"doi\":\"10.11591/IJEEI.V8I1.1810\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.\",\"PeriodicalId\":13516,\"journal\":{\"name\":\"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11591/IJEEI.V8I1.1810\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/IJEEI.V8I1.1810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

在当今的信息系统中,日益无处不在的连接对安全提出了新的挑战。传统的安全机制在确保机密性、完整性、真实性和可用性等明确目标方面取得了长足的进步。然而,随着系统复杂性和攻击复杂性的增长,通过传统手段提供安全性可能是无法承受的。因此,从决策和战略的角度来理解安全需要一个新的理论视角和创新的方法。博弈论是可以帮助研究人员设计计算机网络安全协议的分析工具之一。博弈论概念在包括网络空间在内的各个层面的安全中都有广泛的应用,通常被归类为安全博弈。它可以作为一个强大的数学工具来建模和分析当代安全问题。博弈论为捕获防御者和攻击者之间的防御和对抗互动提供了一个自然的框架。此外,防御者可以通过对安全博弈的均衡评估,深入了解潜在的攻击威胁和攻击者的策略。本文首先介绍了博弈论的概念,然后介绍了博弈论在包括密码学在内的网络安全中的应用。本文分析了不同类型的游戏,特别是那些关注网络空间安全的游戏,并概述了包括机制设计理论在内的各种博弈论方法,为网络安全科学提供了现代基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Comprehensive Insight into Game Theory in relevance to Cyber Security
The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Voltage Rise Problem in Distribution Networks with Distributed Generation: A Review of Technologies, Impact and Mitigation Approaches Development of a Low-Cost Wireless Bee-Hive Temperature and Sound Monitoring System Implementation of Deep Learning Based Method for Optimizing Spatial Diversity MIMO Communication Web Application Reinforcement via Efficient Systematic Analysis and Runtime Validation (ESARV) A Comprehensive Insight into Game Theory in relevance to Cyber Security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1