Application of game theory for modeling information security problems

DOI: 10.31673/2412-4338.2022.011524

Authors

  • В. В. Казімко, (Kazimko V. V.) National Aviation University, Kyiv

Abstract

There is a continuous development of information technologies in terms of diversity and level of their complexity, which is accompanied by an increase in requirements for information protection. With the development of scientific progress, attackers also improve their skills and knowledge causing more damage. Constant communication and increased availability of computing resources for attackers help them to carry out complex and distributed attacks at any moment of time. Since the beginning of the Internet, researchers have been studying the problem of cyber security. However, the problem is far from completely solved. Re-cently, game theory concepts have been applied to all levels of security, including cyberspace, often referred to as security games. Games involve the actions of two or more rational players who have a certain strategy and compete for a certain reward. Game theory secures escrow using quantitative security measures rather than the qualitative measures provided by cryptographic security. In addition, game-theoretic approaches can be extended to design mechanisms that allow system designers to shift balances and predict outcomes in favor of defenders using complex play designs.
Qualitative ways of overcoming traditional approaches to cyber security and privacy with game theory methods were described. In addition, in relation to cyber privacy, game theory has applications in information sharing, anonymity, privacy, and cryptography.
This article examines research on game theory and differential game theory in network security at the applied level. It has been observed that most research works applying game theory concepts are not network specific due to the complexity of cyberspace. So, we present the best research methods that can be used to achieve better results in the defense of cyberspace using game theory.

Keywords: game theory, information security problems, security games.

References
1. Q. Zhu and S. Rass, “Game Theory Meets Network Security: A Tutorial”, in CCS ’18: 2018 ACM SIGSAC Conference on Computer & Communications Security, October 15-19, 2018, To-ronto, ON, Canada, J. B. Sartor, T. D’Hondt, and W. De Meuter (Eds.), ACM, New York, NY, USA, Article 4, p. 4, 2018.
2. M. J. Osborne, “An Introduction to Game Theory by Please send comments to Department of Economics This version,” 2000.
3. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A survey of game theory as applied to network security,” in Proceedings of the 2010 43Rd Hawaii International Conference on System Sciences, pp. 1–10, IEEE, Honolulu, HI, USA, 5 January 2010.
4. M. Outanoute, H. Garmani, M. Baslam, R. Ayachi, and B. Bouikhalene, “A non-cooperative game analysis of competition between content providers in the internet market,” International Journal of Business Data Communications and Networking, vol. 15, no. 1, pp. 88–104, 2019.
5. B. Gu, X. Yang, Z. Lin, W. Hu, M. Alazab, and R. Kharel, “Multiagent actor-critic network-based incentive mechanism for mobile crowdsensing in industrial systems,” IEEE Transactions on Industrial Informatics, vol. 17, p. 1, 2020.
6. S. Handouf and E. Sabir, “Strategic availability and cost-effective UAV-based flying access networks: S-modular game analysis,” Mobile Information Systems, vol. 2019, pp. 1–11,2019
7. D. Ait Omar, H. Garmani, M. El Amrani, M. Baslam, and M. Fakir, “A customer confusion environment in telecom-munication networks: analysis and policy impact,” International Journal of Cooperative Information Systems, vol. 28, no. 02, Article ID 1930002, 2019.
8. Z. Zhou, B. Wang, B. Gu et al., “Time-dependent pricing for bandwidth slicing under infor-mation asymmetry and price discrimination,” IEEE Transactions on Communications, p. 1,2020.
9. T. Roughgarden, Selfish Routing and the price of Anarchy, Vol. 174, MIT press, Cambridge, UK, 2005.
10. H. Garmani, M. Baslam, and M. Jourhmane, “Caching games between ISP in information centric network”, vol. 11, no. 4, pp. 125–142.
11. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A survey of game theory as applied to network security”, in Proceedings of the 2010 43rd Hawaii International Confer-ence on System Sciences, pp. 1–10, IEEE, Honolulu, HI, USA, 5 January 2010.
12. I. Grabar, "Security synergy: cybernetic and informational aspects": monograph / I. G. Grabar, R. V. Hryshchuk, K. V. Molodetska; in general ed. Ph.D., prof. R. V. Hryshchuk. - Zhytomyr: ZhNAEU, 2019. - 280 p.
13. R. Hryshchuk "Basics of cybernetic security": Monograph / R. V. Hryshchuk, Yu. G. Danyk; in general ed. Prof. Y. G. Danyka. - Zhytomyr: ZhNAEU, 2016. - 636 p.
14. R. Hryshchuk "Theoretical foundations of modeling of information attack processes using the methods of the theories of differential games and differential transformations": Monograph / R. V. Hryshchuk. - Zhytomyr: Ruta, 2010. - 280 p.
15. R. Sankardas, E. Charles, S. Sajjan, D. Dipankar, S. Vivek and W. Qishi, "A Survey of Game Theory as Applied to Network Security," in Hawaii International Conference on System Sci-ences, 2010.
16. C.T. Do, N.H. Tran, C. Hong, C.A. Kamhoua, K.A. Kwiat, E. Blasch, S. Ren, N. Pissinou, and S.S. Iyengar, “Game Theory for Cyber Security and Privacy”, ACM Computing Surveys (CSUR), vol. 50, no. 2, pp. 30, 2017.
17. K. Lye and J. Wing, “Game Strategies in Network Security,” Copenhagen, Denmark, 2002.
18. P. Cardaliaguet “ Information issues in differential game theory” EDP Sciences, SMAI 2012, Vol. 35, p. 1-13
19. P. Cardaliaguet, C. Rainer, “Stochastic differential games with asymmetric information.” Appl. Math. Optim. 59: 1-36,2009.
20. P. Cardaliaguet, “Differential games with asymmetric information.”, SIAM J. Control Optim. 46, no. 3, 816–838, 2007.
21. W. Fleming, P. Souganidis, “On the existence of value functions of two-player, zero-sum stochastic differential games.” Indiana Univ. Math. J. 38, No.2, 293-314, 1989
22. M. Crandall, H. Ishii, P. Lions “User’s guide to viscosity solutions of second order Partial Differential Equations.” Bull. Amer. Soc., 27, pp. 1-67, 1992.
23. L. Evans, P. Souganidis, “Differential games and representation formulas for solutions of Hamilton-Jacobi Equations.” Indiana Univ. Math. J., 282, pp. 487-502, 1984.

Published

2023-02-01

Issue

Section

Articles