SlideShare uma empresa Scribd logo
1 de 17

Agenda:
•Introduction
•What is The Game Theory?
•Games Classifications
•Game Theory and Network
 Security
•Examples on Game Theory in
 Network Security
•Limitations of Game Theory
 and directions of research
Introduction:
• Networks today:
  • Personal
  • Business and governments
   (more advanced security)



• Security Devices:
  • Preventive (Firewalls)
  • Reactive (Anti-viruses and IDSs)
Intrusion Detection System
(IDS):
 • Monitors the system
 • Determine the occurrence of attacks
 • Notify network administrator or takes decision
   on it’s own (Intrusion Prevention System IPS)
Problems with IDSs:
Not sophisticated enough:
 • Source Address
 • Encrypted Packets
 • False Alarms




Suggested Solution is GAME THEORY
What is Game Theory?
• The study of strategic decision making.

• A mathematical tool used to describe and solve
  games depending on 4 basic elements:


  1. Players:
  The entities involved in the game
  whether human, animal, devices,
  organizations or any objects that can
  interact with each other.
2. Actions:
In each move, a player takes an action.
Game theory assumes that each player knows
the possible action of other player(s).


3. Payoff:
The return of each player.
It might be positive or negative.


4. Strategies:
A player’s strategy is their plan of
action that specifies which action
to take based on their knowledge of
action history.
Types of Games:
According to the past four elements, games can be
classified into:

1- Cooperative and non-cooperative:
Players can communicate while planning in a cooperative
game. In non-cooperative games this is not allowed. Mostly
this classification is not considered a game classification.


2- Symmetric and asymmetric:
Payoffs depend on the strategy not the
player in a symmetric game. In asymmetric
games, payoffs depend on the player.
Types of Games:
3- Zero- sum and non-zero -sum:
A player wins the amount loosed by
the opponent in a zero sum game.
No increasing or decreasing in
resources.

4- Simultaneous and Sequential:
Simultaneous games are games where
players move simultaneously,
or if they do not move simult-
aneously, the later players are
unaware of the earlier players' actions.
Sequential games (or dynamic games)
are games where later players have some
knowledge about earlier actions.
Types of Games:
5- Perfect information and imperfect
information:
A game is one of perfect information if all players
know the moves previously made by
all other players. Thus, only sequential
games can be games of perfect
information because players in
simultaneous games do not know
the actions of the other players.

6- Combinatorial games
Games in which the difficulty of finding
an optimal strategy comes from the
multiplicity of possible moves.
Game Theory in Network
Security:
The main scenario:
Attackers launch attacks on
network or computer systems,
and defenders respond to these attacks.

Main entities:
•   System
•   Attacker
•   IDS or virtual sensors
•   Defender
Security and Privacy Games in
Computer Networks:
Security of physical and MAC layers:
Zero- sum game.
Required by attacker:
Denial of service.
Required by defender:
Communication of transmitter
and receiver.
Problem model:
• R(T, R, J)
• Transmitter and receiver seek to minimize
  R ( transmitter can amplify the signal).
• Attacker seeks to maximize
  R ( can add noise).
Security and Privacy Games in
Computer Network:
IDS Configuration:
Stochastic Game

Parameters to be modeled:
•   Monetary value of protected assets (w)
•   Detection rate (d) and false alarm rate (f)
•   Cost of attacking (ca) and monitoring (cm)
•   Probability of a node being malicious (m)

Suggested mathematical model:
m < [(1+f)w+cm]/(2d+f-1)w
Security and Privacy Games in
Computer Networks:
Collaborative IDS Networks:
Modeling is based on trusted value or previous
collaborative history.
Directions of Research and
Limitations:
Research:
• Building game models for 3 or more players.
• Development of proper payoff
   functions.
• Wireless Networks

Limitations:
• Ad hoc scheme that depends on the case and application itself.
• An IDS’s ability to detect attacks plays
   an important role in security games modeling.
• Agents aren’t fully rational.
• How to assess and quantify network security?
 (“ We are doomed if we don’t apply
 more security”/ “no need to worry, everything
is fine.”)
References:
Paper:
1- Game Theory for Network Security
Xiannuan Liang and Yang Xiao, Senior Member, IEEE
2013

2- Game Theory Meets Network Security and Privacy
• Mohammad Hossein Manshaeiy, Isfahan University of Technology (IUT), Iran
• Quanyan Zhu, University of Illinois at Urbana-Champaign (UIUC), USA
• Tansu Alpcanz, University of Melbourne, Australia
• Tamer Basar, University of Illinois at Urbana-Champaign (UIUC), USA
• Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
 2011

Links:
For more on Game Theory and more game approaches:
http://en.wikipedia.org/wiki/Game_theory

The International Conference on Game Theory for Networks:
http://gamenets.org/2012/show/home
Thank you

Mais conteúdo relacionado

Mais procurados

Game Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesGame Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesMarc Miquel
 
Decision trees & random forests
Decision trees & random forestsDecision trees & random forests
Decision trees & random forestsSC5.io
 
Game Balance 3: Player Equality and Fairness
Game Balance 3: Player Equality and FairnessGame Balance 3: Player Equality and Fairness
Game Balance 3: Player Equality and FairnessMarc Miquel
 
Quick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game AnalyticsQuick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game AnalyticsKyle Campbell
 
Final Year Game Project Presentation
Final Year Game Project Presentation Final Year Game Project Presentation
Final Year Game Project Presentation Nusrat Jahan Shanta
 
Fundamentals of Game Design - Ch1
Fundamentals of Game Design - Ch1Fundamentals of Game Design - Ch1
Fundamentals of Game Design - Ch1Cynthia Marcello
 
Brief Introduction to Game Design
Brief Introduction to Game DesignBrief Introduction to Game Design
Brief Introduction to Game DesignLennart Nacke
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSAMohamed Loey
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 
Creating a Game Design Document
Creating a Game Design DocumentCreating a Game Design Document
Creating a Game Design DocumentKarl Kapp
 
Game development
Game developmentGame development
Game developmentreittes
 
Reinforcement learning:policy gradient (part 1)
Reinforcement learning:policy gradient (part 1)Reinforcement learning:policy gradient (part 1)
Reinforcement learning:policy gradient (part 1)Bean Yen
 

Mais procurados (20)

RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
Game Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesGame Balance 3: Interesting Strategies
Game Balance 3: Interesting Strategies
 
Decision trees & random forests
Decision trees & random forestsDecision trees & random forests
Decision trees & random forests
 
Game Balancing
Game BalancingGame Balancing
Game Balancing
 
Game Balance 3: Player Equality and Fairness
Game Balance 3: Player Equality and FairnessGame Balance 3: Player Equality and Fairness
Game Balance 3: Player Equality and Fairness
 
Quick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game AnalyticsQuick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game Analytics
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Final Year Game Project Presentation
Final Year Game Project Presentation Final Year Game Project Presentation
Final Year Game Project Presentation
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Epic Fails in LiveOps
Epic Fails in LiveOpsEpic Fails in LiveOps
Epic Fails in LiveOps
 
Game Design
Game DesignGame Design
Game Design
 
Fundamentals of Game Design - Ch1
Fundamentals of Game Design - Ch1Fundamentals of Game Design - Ch1
Fundamentals of Game Design - Ch1
 
Brief Introduction to Game Design
Brief Introduction to Game DesignBrief Introduction to Game Design
Brief Introduction to Game Design
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Game theory
Game theoryGame theory
Game theory
 
Cryptography
CryptographyCryptography
Cryptography
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Creating a Game Design Document
Creating a Game Design DocumentCreating a Game Design Document
Creating a Game Design Document
 
Game development
Game developmentGame development
Game development
 
Reinforcement learning:policy gradient (part 1)
Reinforcement learning:policy gradient (part 1)Reinforcement learning:policy gradient (part 1)
Reinforcement learning:policy gradient (part 1)
 

Destaque

An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game TheoryPaul Trafford
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
Game theory
Game theoryGame theory
Game theoryamaroks
 
Game theory and its applications
Game theory and its applicationsGame theory and its applications
Game theory and its applicationsEranga Weerasekara
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
Game Theory Presentation
Game Theory PresentationGame Theory Presentation
Game Theory PresentationMehdi Ghotbi
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Destaque (14)

An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game Theory
 
National Chlamydia Coaltion: A Work In Progress
National Chlamydia Coaltion: A Work In ProgressNational Chlamydia Coaltion: A Work In Progress
National Chlamydia Coaltion: A Work In Progress
 
Mechanism Design Theory
Mechanism Design TheoryMechanism Design Theory
Mechanism Design Theory
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Game theory
Game theoryGame theory
Game theory
 
Game theory and its applications
Game theory and its applicationsGame theory and its applications
Game theory and its applications
 
Game Theory
Game TheoryGame Theory
Game Theory
 
Hotel Security PPT
Hotel Security PPTHotel Security PPT
Hotel Security PPT
 
Game theory
Game theoryGame theory
Game theory
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
Game Theory Presentation
Game Theory PresentationGame Theory Presentation
Game Theory Presentation
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Semelhante a Game theory in network security

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
Game Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxGame Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxAnders Drachen
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecurityKim Hammar
 
Intelligent Heuristics for the Game Isolation
Intelligent Heuristics  for the Game IsolationIntelligent Heuristics  for the Game Isolation
Intelligent Heuristics for the Game IsolationKory Becker
 
Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...IAEME Publication
 
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptxAI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptxAsst.prof M.Gokilavani
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...grecsl
 
SchankarGameDesign.ppt
SchankarGameDesign.pptSchankarGameDesign.ppt
SchankarGameDesign.pptManoharKumar81
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation ProjectOmar Enayet
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Danny Akacki
 
Learning to Play Complex Games
Learning to Play Complex GamesLearning to Play Complex Games
Learning to Play Complex Gamesbutest
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation ProjectAbdelrahman Al-Ogail
 
Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Tony Martin-Vegue
 
2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & Disincentives2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & DisincentivesAllison Miller
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defenceOWASP EEE
 
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola VasiljevicDataScienceConferenc1
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber securityKim Hammar
 

Semelhante a Game theory in network security (20)

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Game Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxGame Analytics: Opening the Black Box
Game Analytics: Opening the Black Box
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber Security
 
Intelligent Heuristics for the Game Isolation
Intelligent Heuristics  for the Game IsolationIntelligent Heuristics  for the Game Isolation
Intelligent Heuristics for the Game Isolation
 
Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...
 
Game Theory
Game TheoryGame Theory
Game Theory
 
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptxAI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
 
SchankarGameDesign.ppt
SchankarGameDesign.pptSchankarGameDesign.ppt
SchankarGameDesign.ppt
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation Project
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 
Learning to Play Complex Games
Learning to Play Complex GamesLearning to Play Complex Games
Learning to Play Complex Games
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation Project
 
Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?
 
2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & Disincentives2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & Disincentives
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
 
AIIDE'13 Presentation
AIIDE'13 PresentationAIIDE'13 Presentation
AIIDE'13 Presentation
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber security
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Game theory in network security

  • 1.
  • 2. Agenda: •Introduction •What is The Game Theory? •Games Classifications •Game Theory and Network Security •Examples on Game Theory in Network Security •Limitations of Game Theory and directions of research
  • 3. Introduction: • Networks today: • Personal • Business and governments (more advanced security) • Security Devices: • Preventive (Firewalls) • Reactive (Anti-viruses and IDSs)
  • 4. Intrusion Detection System (IDS): • Monitors the system • Determine the occurrence of attacks • Notify network administrator or takes decision on it’s own (Intrusion Prevention System IPS)
  • 5. Problems with IDSs: Not sophisticated enough: • Source Address • Encrypted Packets • False Alarms Suggested Solution is GAME THEORY
  • 6. What is Game Theory? • The study of strategic decision making. • A mathematical tool used to describe and solve games depending on 4 basic elements: 1. Players: The entities involved in the game whether human, animal, devices, organizations or any objects that can interact with each other.
  • 7. 2. Actions: In each move, a player takes an action. Game theory assumes that each player knows the possible action of other player(s). 3. Payoff: The return of each player. It might be positive or negative. 4. Strategies: A player’s strategy is their plan of action that specifies which action to take based on their knowledge of action history.
  • 8. Types of Games: According to the past four elements, games can be classified into: 1- Cooperative and non-cooperative: Players can communicate while planning in a cooperative game. In non-cooperative games this is not allowed. Mostly this classification is not considered a game classification. 2- Symmetric and asymmetric: Payoffs depend on the strategy not the player in a symmetric game. In asymmetric games, payoffs depend on the player.
  • 9. Types of Games: 3- Zero- sum and non-zero -sum: A player wins the amount loosed by the opponent in a zero sum game. No increasing or decreasing in resources. 4- Simultaneous and Sequential: Simultaneous games are games where players move simultaneously, or if they do not move simult- aneously, the later players are unaware of the earlier players' actions. Sequential games (or dynamic games) are games where later players have some knowledge about earlier actions.
  • 10. Types of Games: 5- Perfect information and imperfect information: A game is one of perfect information if all players know the moves previously made by all other players. Thus, only sequential games can be games of perfect information because players in simultaneous games do not know the actions of the other players. 6- Combinatorial games Games in which the difficulty of finding an optimal strategy comes from the multiplicity of possible moves.
  • 11. Game Theory in Network Security: The main scenario: Attackers launch attacks on network or computer systems, and defenders respond to these attacks. Main entities: • System • Attacker • IDS or virtual sensors • Defender
  • 12. Security and Privacy Games in Computer Networks: Security of physical and MAC layers: Zero- sum game. Required by attacker: Denial of service. Required by defender: Communication of transmitter and receiver. Problem model: • R(T, R, J) • Transmitter and receiver seek to minimize R ( transmitter can amplify the signal). • Attacker seeks to maximize R ( can add noise).
  • 13. Security and Privacy Games in Computer Network: IDS Configuration: Stochastic Game Parameters to be modeled: • Monetary value of protected assets (w) • Detection rate (d) and false alarm rate (f) • Cost of attacking (ca) and monitoring (cm) • Probability of a node being malicious (m) Suggested mathematical model: m < [(1+f)w+cm]/(2d+f-1)w
  • 14. Security and Privacy Games in Computer Networks: Collaborative IDS Networks: Modeling is based on trusted value or previous collaborative history.
  • 15. Directions of Research and Limitations: Research: • Building game models for 3 or more players. • Development of proper payoff functions. • Wireless Networks Limitations: • Ad hoc scheme that depends on the case and application itself. • An IDS’s ability to detect attacks plays an important role in security games modeling. • Agents aren’t fully rational. • How to assess and quantify network security? (“ We are doomed if we don’t apply more security”/ “no need to worry, everything is fine.”)
  • 16. References: Paper: 1- Game Theory for Network Security Xiannuan Liang and Yang Xiao, Senior Member, IEEE 2013 2- Game Theory Meets Network Security and Privacy • Mohammad Hossein Manshaeiy, Isfahan University of Technology (IUT), Iran • Quanyan Zhu, University of Illinois at Urbana-Champaign (UIUC), USA • Tansu Alpcanz, University of Melbourne, Australia • Tamer Basar, University of Illinois at Urbana-Champaign (UIUC), USA • Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland 2011 Links: For more on Game Theory and more game approaches: http://en.wikipedia.org/wiki/Game_theory The International Conference on Game Theory for Networks: http://gamenets.org/2012/show/home