Abstract

The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.

Highlights

  • Modern-day communication technology, as well as information, are progressing rapidly in terms of diversity and its sophistication level

  • Game theory offers a natural framework for capturing the defensive as well as adversarial interactions between the defenders and the attackers

  • Examples include dynamic games for adaptive network security defence [7,8,9,10,11], multiple-layered and Stackelberg games for proactive protection [12,13,14], investigation of resource allocation methods using mechanism design theory for network security economics [15,16,17,18,19], game-theoretic examination of the concepts of cryptography – authentication and confidentiality [20, 21], network provisioning and design [22,23,24,25], quantitative management of security risks [26,27,28,29,30], and network games for cyber-physical protection dealing with information assurance and critical infrastructure security [31,32,33,34,35]

Read more

Summary

A Comprehensive Insight into Game Theory in relevance to Cyber Security

Olanrewaju, Bisma Rasool Pampori and Roohie Naaz Mir. 1,2,3Department of Electrical and Computer Engineering, Kulliyyah of Engineering, IIUM Malaysia 4Department of Information Technology, CUK Srinagar, Kashmir, India. Article history: Received Nov 10, 2019 Revised Feb 27, 2020 Accepted Mar 4, 2020

INTRODUCTION
CYBER SECURITY
Nash equilibrium
GAME THEORY AND CYBER SECURITY
CLASSIFICATION OF GAMES WITH THEIR APPICATIONS IN NETWORK SECURITY
BLENDING GAME THEORY AND CRYPTOGRAPHY
FUTURE RESEARCH DIRECTIONS
CONCLUSION
New York
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call