Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Dynamic Games for Network SecurityConclusion and Future Work

Dynamic Games for Network Security: Conclusion and Future Work [In this book, we have studied the applications of SG theory in addressing various dynamic network security games, with a particular focus on the techniques of handling scenarios with information asymmetry. In Chap. 1, preliminaries of game theory, MDP, and SG have been reviewed. With these necessary backgrounds, a brief review of existing security applications of the SG framework is provided in Chap. 2. We have further examined several novel techniques for SG with information asymmetry and their security applications. Particularly, the discussions in Chap. 3 focus on dynamic security games with extra information, and the complementary situations where the defender only has incomplete information are examined in Chap. 4 through the lens of Bayesian SG. In Chap. 5, we have studied how the defender can proactively create information asymmetry to enhance security performance. Lastly, in this chapter, summary and perspective for future works will be provided.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Dynamic Games for Network SecurityConclusion and Future Work

Loading next page...
 
/lp/springer-journals/dynamic-games-for-network-security-conclusion-and-future-work-OW0L22p80S
Publisher
Springer International Publishing
Copyright
© The Author(s) 2018
ISBN
978-3-319-75870-1
Pages
73 –74
DOI
10.1007/978-3-319-75871-8_6
Publisher site
See Chapter on Publisher Site

Abstract

[In this book, we have studied the applications of SG theory in addressing various dynamic network security games, with a particular focus on the techniques of handling scenarios with information asymmetry. In Chap. 1, preliminaries of game theory, MDP, and SG have been reviewed. With these necessary backgrounds, a brief review of existing security applications of the SG framework is provided in Chap. 2. We have further examined several novel techniques for SG with information asymmetry and their security applications. Particularly, the discussions in Chap. 3 focus on dynamic security games with extra information, and the complementary situations where the defender only has incomplete information are examined in Chap. 4 through the lens of Bayesian SG. In Chap. 5, we have studied how the defender can proactively create information asymmetry to enhance security performance. Lastly, in this chapter, summary and perspective for future works will be provided.]

Published: Mar 1, 2018

Keywords: Security-enhanced Operating; Security Game; Complementary Situation; Security Applications; Extra Information

There are no references for this article.