Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions

被引:0
作者
Abdallah, Mustafa [1 ]
Bagchi, Saurabh [2 ]
Bopardikar, Shaunak D. [3 ]
Chan, Kevin [4 ]
Gao, Xing [5 ]
Kantarcioglu, Murat [6 ,7 ]
Li, Congmiao [8 ]
Liu, Peng [9 ,10 ]
Zhu, Quanyan [11 ]
机构
[1] Indiana Univ Purdue Univ, Sch Engn & Technol, W Lafayette, IN 47907 USA
[2] Purdue Univ, Elect & Comp Engn & Comp Sci, W Lafayette, IN 47907 USA
[3] Michigan State Univ, Elect & Comp Engn ECE Dept, E Lansing, MI 48825 USA
[4] Army Res Lab, Adelphi, MD USA
[5] Univ Delaware, Dept Comp & Informat Sci, Newark, NJ USA
[6] Univ Texas Dallas, Comp Sci Dept, Dallas, TX 75080 USA
[7] Univ Texas Dallas, Data Secur & Privacy Lab, Dallas, TX 75080 USA
[8] Univ Calif Irvine, Irvine, CA 92697 USA
[9] Penn State Univ, Ctr Cyber Secur Informat Privacy & Trust, University Pk, PA 16802 USA
[10] Penn State Univ, Cyber Secur Lab, University Pk, PA 16802 USA
[11] NYU, Dept Elect & Comp Engn, New York, NY 11201 USA
基金
美国国家科学基金会;
关键词
Security; Games; Game theory; Surveys; Botnet; Investment; Faces;
D O I
10.1109/MSEC.2024.3407593
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Combining insights from distributed system security and game theory could effectively address security challenges. We present foundational concepts from both fields that can be integrated to better secure distributed systems and outline several research challenges for the community to tackle.
引用
收藏
页码:64 / 74
页数:11
相关论文
共 20 条
[1]  
Abdallah M, 2022, P IEEE S SECUR PRIV, P249, DOI [10.1109/SP46214.2022.9833591, 10.1109/SP46214.2022.00106]
[2]   Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs [J].
Abdallah, Mustafa ;
Naghizadeh, Parinaz ;
Hota, Ashish R. ;
Cason, Timothy ;
Bagchi, Saurabh ;
Sundaram, Shreyas .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04) :1585-1596
[3]  
[Anonymous], 2010, Network Security: A Decision and GameTheoretic Approach
[4]  
Bensoussan A, 2010, LECT NOTES COMPUT SC, V6442, P135, DOI 10.1007/978-3-642-17197-0_9
[5]   Randomized sampling for large zero-sum games [J].
Bopardikar, Shaunak D. ;
Borri, Alessandro ;
Hespanha, Joao P. ;
Prandini, Maria ;
Di Benedetto, Maria D. .
AUTOMATICA, 2013, 49 (05) :1184-1194
[6]   Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals [J].
Huang, Yunhan ;
Zhu, Quanyan .
DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 :217-237
[7]   Cyber-Physical Systems Security-A Survey [J].
Humayed, Abdulmalik ;
Lin, Jingqiang ;
Li, Fengjun ;
Luo, Bo .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1802-1831
[8]   PROSPECT THEORY - ANALYSIS OF DECISION UNDER RISK [J].
KAHNEMAN, D ;
TVERSKY, A .
ECONOMETRICA, 1979, 47 (02) :263-291
[9]   Automated rule-based diagnosis through a distributed monitor system [J].
Khanna, Gunjan ;
Cheng, Mike Yu ;
Varadharajan, Padma ;
Bagchi, Saurabh ;
Correia, Miguel P. ;
Verissimo, Paulo J. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :266-279
[10]   A Survey of Interdependent Information Security Games [J].
Laszka, Aron ;
Felegyhazi, Mark ;
Buttyan, Levente .
ACM COMPUTING SURVEYS, 2015, 47 (02)