SlideShare ist ein Scribd-Unternehmen logo
1 von 17

Agenda:
•Introduction
•What is The Game Theory?
•Games Classifications
•Game Theory and Network
 Security
•Examples on Game Theory in
 Network Security
•Limitations of Game Theory
 and directions of research
Introduction:
• Networks today:
  • Personal
  • Business and governments
   (more advanced security)



• Security Devices:
  • Preventive (Firewalls)
  • Reactive (Anti-viruses and IDSs)
Intrusion Detection System
(IDS):
 • Monitors the system
 • Determine the occurrence of attacks
 • Notify network administrator or takes decision
   on it’s own (Intrusion Prevention System IPS)
Problems with IDSs:
Not sophisticated enough:
 • Source Address
 • Encrypted Packets
 • False Alarms




Suggested Solution is GAME THEORY
What is Game Theory?
• The study of strategic decision making.

• A mathematical tool used to describe and solve
  games depending on 4 basic elements:


  1. Players:
  The entities involved in the game
  whether human, animal, devices,
  organizations or any objects that can
  interact with each other.
2. Actions:
In each move, a player takes an action.
Game theory assumes that each player knows
the possible action of other player(s).


3. Payoff:
The return of each player.
It might be positive or negative.


4. Strategies:
A player’s strategy is their plan of
action that specifies which action
to take based on their knowledge of
action history.
Types of Games:
According to the past four elements, games can be
classified into:

1- Cooperative and non-cooperative:
Players can communicate while planning in a cooperative
game. In non-cooperative games this is not allowed. Mostly
this classification is not considered a game classification.


2- Symmetric and asymmetric:
Payoffs depend on the strategy not the
player in a symmetric game. In asymmetric
games, payoffs depend on the player.
Types of Games:
3- Zero- sum and non-zero -sum:
A player wins the amount loosed by
the opponent in a zero sum game.
No increasing or decreasing in
resources.

4- Simultaneous and Sequential:
Simultaneous games are games where
players move simultaneously,
or if they do not move simult-
aneously, the later players are
unaware of the earlier players' actions.
Sequential games (or dynamic games)
are games where later players have some
knowledge about earlier actions.
Types of Games:
5- Perfect information and imperfect
information:
A game is one of perfect information if all players
know the moves previously made by
all other players. Thus, only sequential
games can be games of perfect
information because players in
simultaneous games do not know
the actions of the other players.

6- Combinatorial games
Games in which the difficulty of finding
an optimal strategy comes from the
multiplicity of possible moves.
Game Theory in Network
Security:
The main scenario:
Attackers launch attacks on
network or computer systems,
and defenders respond to these attacks.

Main entities:
•   System
•   Attacker
•   IDS or virtual sensors
•   Defender
Security and Privacy Games in
Computer Networks:
Security of physical and MAC layers:
Zero- sum game.
Required by attacker:
Denial of service.
Required by defender:
Communication of transmitter
and receiver.
Problem model:
• R(T, R, J)
• Transmitter and receiver seek to minimize
  R ( transmitter can amplify the signal).
• Attacker seeks to maximize
  R ( can add noise).
Security and Privacy Games in
Computer Network:
IDS Configuration:
Stochastic Game

Parameters to be modeled:
•   Monetary value of protected assets (w)
•   Detection rate (d) and false alarm rate (f)
•   Cost of attacking (ca) and monitoring (cm)
•   Probability of a node being malicious (m)

Suggested mathematical model:
m < [(1+f)w+cm]/(2d+f-1)w
Security and Privacy Games in
Computer Networks:
Collaborative IDS Networks:
Modeling is based on trusted value or previous
collaborative history.
Directions of Research and
Limitations:
Research:
• Building game models for 3 or more players.
• Development of proper payoff
   functions.
• Wireless Networks

Limitations:
• Ad hoc scheme that depends on the case and application itself.
• An IDS’s ability to detect attacks plays
   an important role in security games modeling.
• Agents aren’t fully rational.
• How to assess and quantify network security?
 (“ We are doomed if we don’t apply
 more security”/ “no need to worry, everything
is fine.”)
References:
Paper:
1- Game Theory for Network Security
Xiannuan Liang and Yang Xiao, Senior Member, IEEE
2013

2- Game Theory Meets Network Security and Privacy
• Mohammad Hossein Manshaeiy, Isfahan University of Technology (IUT), Iran
• Quanyan Zhu, University of Illinois at Urbana-Champaign (UIUC), USA
• Tansu Alpcanz, University of Melbourne, Australia
• Tamer Basar, University of Illinois at Urbana-Champaign (UIUC), USA
• Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
 2011

Links:
For more on Game Theory and more game approaches:
http://en.wikipedia.org/wiki/Game_theory

The International Conference on Game Theory for Networks:
http://gamenets.org/2012/show/home
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Defending deep learning from adversarial attacks
Defending deep learning from adversarial attacksDefending deep learning from adversarial attacks
Defending deep learning from adversarial attacksSvetlana Levitan, PhD
 
Self Organizing Maps
Self Organizing MapsSelf Organizing Maps
Self Organizing MapsDaksh Raj Chopra
 
Quick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game AnalyticsQuick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game AnalyticsKyle Campbell
 
Tic Tac Toe Java Development
Tic Tac Toe Java DevelopmentTic Tac Toe Java Development
Tic Tac Toe Java Developmentpengqia chen
 
Game Theory Strategic Decision Making
Game Theory Strategic Decision MakingGame Theory Strategic Decision Making
Game Theory Strategic Decision MakingCaner Erden
 
Interactive Fiction - Text Based Game
Interactive Fiction - Text Based GameInteractive Fiction - Text Based Game
Interactive Fiction - Text Based GameLevay 08
 
Transfer learning-presentation
Transfer learning-presentationTransfer learning-presentation
Transfer learning-presentationBushra Jbawi
 
Game Theory and Engineering Applications
Game Theory and Engineering ApplicationsGame Theory and Engineering Applications
Game Theory and Engineering ApplicationsDr Ganesh Iyer
 
Sequential Decision Making in Recommendations
Sequential Decision Making in RecommendationsSequential Decision Making in Recommendations
Sequential Decision Making in RecommendationsJaya Kawale
 
Introduction to Neural Networks
Introduction to Neural NetworksIntroduction to Neural Networks
Introduction to Neural NetworksDatabricks
 
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Simplilearn
 
“Improving” prediction of human behavior using behavior modification
“Improving” prediction of human behavior using behavior modification“Improving” prediction of human behavior using behavior modification
“Improving” prediction of human behavior using behavior modificationGalit Shmueli
 
Public Key Distribution
Public Key Distribution Public Key Distribution
Public Key Distribution Mostafijur Rahman
 
Gamification / Social Gamification of Education
Gamification / Social Gamification of EducationGamification / Social Gamification of Education
Gamification / Social Gamification of EducationJorge SimĂľes
 

Was ist angesagt? (20)

Defending deep learning from adversarial attacks
Defending deep learning from adversarial attacksDefending deep learning from adversarial attacks
Defending deep learning from adversarial attacks
 
Self Organizing Maps
Self Organizing MapsSelf Organizing Maps
Self Organizing Maps
 
Quick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game AnalyticsQuick Introduction to F2P Mobile Game Analytics
Quick Introduction to F2P Mobile Game Analytics
 
Tic Tac Toe Java Development
Tic Tac Toe Java DevelopmentTic Tac Toe Java Development
Tic Tac Toe Java Development
 
Game Theory Strategic Decision Making
Game Theory Strategic Decision MakingGame Theory Strategic Decision Making
Game Theory Strategic Decision Making
 
Gamification
GamificationGamification
Gamification
 
Interactive Fiction - Text Based Game
Interactive Fiction - Text Based GameInteractive Fiction - Text Based Game
Interactive Fiction - Text Based Game
 
Transfer learning-presentation
Transfer learning-presentationTransfer learning-presentation
Transfer learning-presentation
 
Game Theory and Engineering Applications
Game Theory and Engineering ApplicationsGame Theory and Engineering Applications
Game Theory and Engineering Applications
 
Sequential Decision Making in Recommendations
Sequential Decision Making in RecommendationsSequential Decision Making in Recommendations
Sequential Decision Making in Recommendations
 
Introduction to Neural Networks
Introduction to Neural NetworksIntroduction to Neural Networks
Introduction to Neural Networks
 
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
 
“Improving” prediction of human behavior using behavior modification
“Improving” prediction of human behavior using behavior modification“Improving” prediction of human behavior using behavior modification
“Improving” prediction of human behavior using behavior modification
 
Yolo
YoloYolo
Yolo
 
Public Key Distribution
Public Key Distribution Public Key Distribution
Public Key Distribution
 
Endless runner
Endless runnerEndless runner
Endless runner
 
Shap
ShapShap
Shap
 
Tic Tac Toe
Tic Tac ToeTic Tac Toe
Tic Tac Toe
 
Bayesian networks
Bayesian networksBayesian networks
Bayesian networks
 
Gamification / Social Gamification of Education
Gamification / Social Gamification of EducationGamification / Social Gamification of Education
Gamification / Social Gamification of Education
 

Andere mochten auch

An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game TheoryPaul Trafford
 
National Chlamydia Coaltion: A Work In Progress
National Chlamydia Coaltion: A Work In ProgressNational Chlamydia Coaltion: A Work In Progress
National Chlamydia Coaltion: A Work In ProgressNational Chlamydia Coalition
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
Game theory
Game theoryGame theory
Game theoryamaroks
 
Game theory and its applications
Game theory and its applicationsGame theory and its applications
Game theory and its applicationsEranga Weerasekara
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
Game Theory Presentation
Game Theory PresentationGame Theory Presentation
Game Theory PresentationMehdi Ghotbi
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Andere mochten auch (14)

An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game Theory
 
National Chlamydia Coaltion: A Work In Progress
National Chlamydia Coaltion: A Work In ProgressNational Chlamydia Coaltion: A Work In Progress
National Chlamydia Coaltion: A Work In Progress
 
Mechanism Design Theory
Mechanism Design TheoryMechanism Design Theory
Mechanism Design Theory
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Game theory
Game theoryGame theory
Game theory
 
Game theory and its applications
Game theory and its applicationsGame theory and its applications
Game theory and its applications
 
Game Theory
Game TheoryGame Theory
Game Theory
 
Hotel Security PPT
Hotel Security PPTHotel Security PPT
Hotel Security PPT
 
Game theory
Game theoryGame theory
Game theory
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
Game Theory Presentation
Game Theory PresentationGame Theory Presentation
Game Theory Presentation
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Ähnlich wie Game theory in network security

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
Game Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxGame Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxAnders Drachen
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecurityKim Hammar
 
Intelligent Heuristics for the Game Isolation
Intelligent Heuristics  for the Game IsolationIntelligent Heuristics  for the Game Isolation
Intelligent Heuristics for the Game IsolationKory Becker
 
Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...IAEME Publication
 
Game Theory
Game TheoryGame Theory
Game TheoryAli Salek
 
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptxAI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptxAsst.prof M.Gokilavani
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...grecsl
 
SchankarGameDesign.ppt
SchankarGameDesign.pptSchankarGameDesign.ppt
SchankarGameDesign.pptManoharKumar81
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation ProjectOmar Enayet
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Danny Akacki
 
Learning to Play Complex Games
Learning to Play Complex GamesLearning to Play Complex Games
Learning to Play Complex Gamesbutest
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation ProjectAbdelrahman Al-Ogail
 
Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Tony Martin-Vegue
 
2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & Disincentives2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & DisincentivesAllison Miller
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defenceOWASP EEE
 
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola VasiljevicDataScienceConferenc1
 
AIIDE'13 Presentation
AIIDE'13 PresentationAIIDE'13 Presentation
AIIDE'13 PresentationMarlon Etheredge
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber securityKim Hammar
 

Ähnlich wie Game theory in network security (20)

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Game Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxGame Analytics: Opening the Black Box
Game Analytics: Opening the Black Box
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber Security
 
Intelligent Heuristics for the Game Isolation
Intelligent Heuristics  for the Game IsolationIntelligent Heuristics  for the Game Isolation
Intelligent Heuristics for the Game Isolation
 
Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...Game theory a novel tool to design model analyze and optimize cooperative net...
Game theory a novel tool to design model analyze and optimize cooperative net...
 
Game Theory
Game TheoryGame Theory
Game Theory
 
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptxAI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
AI3391 Artificial Intelligence Session 14 Adversarial Search .pptx
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
 
SchankarGameDesign.ppt
SchankarGameDesign.pptSchankarGameDesign.ppt
SchankarGameDesign.ppt
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation Project
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 
Learning to Play Complex Games
Learning to Play Complex GamesLearning to Play Complex Games
Learning to Play Complex Games
 
Introduction To My Graduation Project
Introduction To My Graduation ProjectIntroduction To My Graduation Project
Introduction To My Graduation Project
 
Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?
 
2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & Disincentives2012.12 Games We Play: Defenses & Disincentives
2012.12 Games We Play: Defenses & Disincentives
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
[Pandora 22] Boosting Game Design with Analytics - Nikola Vasiljevic
 
AIIDE'13 Presentation
AIIDE'13 PresentationAIIDE'13 Presentation
AIIDE'13 Presentation
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber security
 

KĂźrzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

KĂźrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Game theory in network security

  • 2. Agenda: •Introduction •What is The Game Theory? •Games Classifications •Game Theory and Network Security •Examples on Game Theory in Network Security •Limitations of Game Theory and directions of research
  • 3. Introduction: • Networks today: • Personal • Business and governments (more advanced security) • Security Devices: • Preventive (Firewalls) • Reactive (Anti-viruses and IDSs)
  • 4. Intrusion Detection System (IDS): • Monitors the system • Determine the occurrence of attacks • Notify network administrator or takes decision on it’s own (Intrusion Prevention System IPS)
  • 5. Problems with IDSs: Not sophisticated enough: • Source Address • Encrypted Packets • False Alarms Suggested Solution is GAME THEORY
  • 6. What is Game Theory? • The study of strategic decision making. • A mathematical tool used to describe and solve games depending on 4 basic elements: 1. Players: The entities involved in the game whether human, animal, devices, organizations or any objects that can interact with each other.
  • 7. 2. Actions: In each move, a player takes an action. Game theory assumes that each player knows the possible action of other player(s). 3. Payoff: The return of each player. It might be positive or negative. 4. Strategies: A player’s strategy is their plan of action that specifies which action to take based on their knowledge of action history.
  • 8. Types of Games: According to the past four elements, games can be classified into: 1- Cooperative and non-cooperative: Players can communicate while planning in a cooperative game. In non-cooperative games this is not allowed. Mostly this classification is not considered a game classification. 2- Symmetric and asymmetric: Payoffs depend on the strategy not the player in a symmetric game. In asymmetric games, payoffs depend on the player.
  • 9. Types of Games: 3- Zero- sum and non-zero -sum: A player wins the amount loosed by the opponent in a zero sum game. No increasing or decreasing in resources. 4- Simultaneous and Sequential: Simultaneous games are games where players move simultaneously, or if they do not move simult- aneously, the later players are unaware of the earlier players' actions. Sequential games (or dynamic games) are games where later players have some knowledge about earlier actions.
  • 10. Types of Games: 5- Perfect information and imperfect information: A game is one of perfect information if all players know the moves previously made by all other players. Thus, only sequential games can be games of perfect information because players in simultaneous games do not know the actions of the other players. 6- Combinatorial games Games in which the difficulty of finding an optimal strategy comes from the multiplicity of possible moves.
  • 11. Game Theory in Network Security: The main scenario: Attackers launch attacks on network or computer systems, and defenders respond to these attacks. Main entities: • System • Attacker • IDS or virtual sensors • Defender
  • 12. Security and Privacy Games in Computer Networks: Security of physical and MAC layers: Zero- sum game. Required by attacker: Denial of service. Required by defender: Communication of transmitter and receiver. Problem model: • R(T, R, J) • Transmitter and receiver seek to minimize R ( transmitter can amplify the signal). • Attacker seeks to maximize R ( can add noise).
  • 13. Security and Privacy Games in Computer Network: IDS Configuration: Stochastic Game Parameters to be modeled: • Monetary value of protected assets (w) • Detection rate (d) and false alarm rate (f) • Cost of attacking (ca) and monitoring (cm) • Probability of a node being malicious (m) Suggested mathematical model: m < [(1+f)w+cm]/(2d+f-1)w
  • 14. Security and Privacy Games in Computer Networks: Collaborative IDS Networks: Modeling is based on trusted value or previous collaborative history.
  • 15. Directions of Research and Limitations: Research: • Building game models for 3 or more players. • Development of proper payoff functions. • Wireless Networks Limitations: • Ad hoc scheme that depends on the case and application itself. • An IDS’s ability to detect attacks plays an important role in security games modeling. • Agents aren’t fully rational. • How to assess and quantify network security? (“ We are doomed if we don’t apply more security”/ “no need to worry, everything is fine.”)
  • 16. References: Paper: 1- Game Theory for Network Security Xiannuan Liang and Yang Xiao, Senior Member, IEEE 2013 2- Game Theory Meets Network Security and Privacy • Mohammad Hossein Manshaeiy, Isfahan University of Technology (IUT), Iran • Quanyan Zhu, University of Illinois at Urbana-Champaign (UIUC), USA • Tansu Alpcanz, University of Melbourne, Australia • Tamer Basar, University of Illinois at Urbana-Champaign (UIUC), USA • Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland 2011 Links: For more on Game Theory and more game approaches: http://en.wikipedia.org/wiki/Game_theory The International Conference on Game Theory for Networks: http://gamenets.org/2012/show/home