Skip to main content

Game Theory for Security

  • Living reference work entry
  • Latest version View entry history
  • First Online:
Encyclopedia of Systems and Control
  • 134 Accesses

Abstract

Game theory provides a mature mathematical foundation for making security decisions in a principled manner. Security games help formalizing security problems and decisions using quantitative models. The resulting analytical frameworks lead to better allocation of limited resources and result in more informed responses to security problems in complex systems and organizations. The game-theoretic approach to security is applicable to a wide variety of cyberphysical systems and critical infrastructures such as electrical power systems, financial services, transportation, data centers, and communication networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Bibliography

  • Alpcan T, BaÅŸar T (2011) Network security: a decision and game theoretic approach. Cambridge University Press. http://www.tansu.alpcan.org/book.php

    MATH  Google Scholar 

  • Altman E, BaÅŸar T, Kavitha V (2010) Adversarial control in a delay tolerant network. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 87–106. https://doi.org/10.1007/978-3-642-17197-0_6

    Chapter  Google Scholar 

  • Buttyan L, Hubaux JP (2008) Security and cooperation in wireless networks. Cambridge University Press, Cambridge. http://secowinet.epfl.ch

    Google Scholar 

  • Chorppath AK, Alpcan T (2011) Adversarial behavior in network mechanism design. In: Proceedings of 4th International workshop on game theory in communication networks (Gamecomm). ENS, Cachan

    Google Scholar 

  • Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F (2014) Game theory meets information security management. In: IFIP international information security conference. Springer, pp 15–29

    Google Scholar 

  • Gueye A, Walrand J, Anantharam V (2010) Design of network topology in an adversarial environment. In: Alpcan T, Buttyán L, Baras J (eds) Decision and game theory for security. Lecture notes in computer science, vol 6442. Springer, Berlin/Heidelberg, pp 1–20. https://doi.org/10.1007/978-3-642-17197-0_1

    Chapter  Google Scholar 

  • Guikema SD (2009) Game theory models of intelligent actors in reliability analysis: an overview of the state of the art. In: Game theoretic risk analysis of security threats. Springer, pp 1–19. https://doi.org/10.1007/978-0-387-87767-9

    Google Scholar 

  • Han Y, Chan J, Alpcan T, Leckie C (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108. https://doi.org/10.1109/TDSC.2015.2429132

    Google Scholar 

  • Kantarcioglu M, Bensoussan A, Hoe S (2011) Investment in privacy-preserving technologies under uncertainty. In: Baras J, Katz J, Altman E (eds) Decision and game theory for security. Lecture notes in computer science, vol 7037. Springer, Berlin/Heidelberg, pp 219–238. https://doi.org/10.1007/978-3-642-25280-8_17

    Chapter  Google Scholar 

  • Kashyap A, BaÅŸar T, Srikant R (2004) Correlated jamming on MIMO Gaussian fading channels. IEEE Trans Inf Theory 50(9):2119–2123. https://doi.org/10.1109/TIT.2004.833358

    Article  MathSciNet  Google Scholar 

  • Kodialam M, Lakshman TV (2003) Detecting network intrusions via sampling: a game theoretic approach. In: Proceedings of 22nd IEEE conference on computer communications (Infocom), San Fransisco, vol 3, pp 1880–1889

    Google Scholar 

  • Law YW, Alpcan T, Palaniswami M (2012) Security games for voltage control in smart grid. In: 2012 50th annual Allerton conference on communication, control, and computing (Allerton), pp 212–219. https://doi.org/10.1109/Allerton.2012.6483220

  • Manshaei MH, Zhu Q, Alpcan T, BaÅŸar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):25:1–25:39. https://doi.org/10.1145/2480741.2480742

    Article  Google Scholar 

  • Miura-Ko RA, Yolken B, Bambos N, Mitchell J (2008) Security investment games of interdependent organizations. In: 46th annual Allerton conference

    Google Scholar 

  • Mounzer J, Alpcan T, Bambos N (2010) Dynamic control and mitigation of interdependent IT security risks. In: Proceedings of the IEEE conference on communication (ICC). IEEE Communications Society

    Google Scholar 

  • Pita J, Jain M, Ordónez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2009) Using game theory for Los Angeles airport security. AI Mag 30(1):43–43

    Article  Google Scholar 

  • Roth A (2008) The price of malice in linear congestion games. In: WINE’08: proceedings of the 4th international workshop on internet and network economics, pp 118–125

    Google Scholar 

  • Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press. http://books.google.com.au/books?id=hjjkJ7u209YC

    Book  Google Scholar 

  • Zander J (1990) Jamming games in slotted Aloha packet radio networks. In: IEEE military communications conference (MILCOM), vol 2, pp 830–834. https://doi.org/10.1109/MILCOM.1990.117531

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tansu Alpcan .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer-Verlag London Ltd., part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Alpcan, T. (2019). Game Theory for Security. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, London. https://doi.org/10.1007/978-1-4471-5102-9_37-2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-2

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5102-9

  • Online ISBN: 978-1-4471-5102-9

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Game Theory for Security
    Published:
    10 September 2019

    DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-2

  2. Original

    Game Theory for Security
    Published:
    28 February 2014

    DOI: https://doi.org/10.1007/978-1-4471-5102-9_37-1