How Game Theory Can Be Viewed As A Conflict Resolution Scenario

4589 WordsSep 26, 201519 Pages
ABSTRACT: The Internet is an integral way of conducting daily business from government agencies to entertainers. Protection of attack, damage, or unauthorized access is necessary with the increase of mobile users, digital applications and data networks. A cyber security problem can be viewed as a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that can each have competing objectives. For instance, the defender may be interested in ensuring that the system performs at or above a certain acceptable level. The attacker’s objective may be to disrupt the system and degrade it. Game theory is a well-established tool that can be used to analyze such problems. In this work, we present a brief survey of how game theory can be used to find appropriate strategies for both the attacker and the administrator (defender). We model the interactions between them as a stochastic game. Various formulations of game theory will be presented to deal with different cyber security situations. We will present mathematical models of security systems to analyze the system’s performance and to predict the likely behavior of key decision makers that influence/control the system. 1 INTRODUCTION The purpose of this paper will be to provide a brief survey of stochastic game methods in cyber security. The fast development of this area explains the abundance of literature and models. Due to our specific emphasis, and

More about How Game Theory Can Be Viewed As A Conflict Resolution Scenario

Open Document