TY - GEN
T1 - Game theory meets network security a tutorial
AU - Zhu, Quanyan
AU - Rass, Stefan
N1 - Funding Information:
Quanyan Zhu received B. Eng. in Hon- ors Electrical Engineering from McGill University in 2006, M.A.Sc. from Uni- versity of Toronto in 2008, and Ph.D. from the University of Illinois at Urbana- Champaign (UIUC) in 2013. After stints at Princeton University, he is currently an assistant professor at the Department of Electrical and Computer Engineering, New York University. He is a recipient of many awards including NSERC Canada Graduate Scholarship (CGS), Mavis Future Faculty Fellowships, and NSERC Postdoctoral Fellowship (PDF). He spearheaded and chaired INFOCOM Workshop on Communications and Control on Smart Energy Systems (CCSES), and Midwest Workshop on Control and Game Theory (WCGT). His current research interests include resilient and secure interdependent critical infrastructures, energy systems, cyber-physical systems, and cyber-enabled sustainability. He is a recipient of best paper awards at 5th International Conference on Resilient Control Systems, and 18th International Conference on Information Fusion. He has served as the general chair of the 7th Conference on Decision and Game Theory for Security (GameSec) in 2016 and International Conference on NETwork Games, COntrol and OPtimisation (NETGCOOP) in 2018. Website: http://wp.nyu.edu/quanyan Stefan Rass graduated with a double master degree in mathematics and com- puter science from the Universitaet Kla- genfurt in 2005. He received a PhD de- gree in mathematics in 2009, and habil- itated on applied computer science and system security in 2014. His research in- terests cover decision theory and game- theory with applications in system se- curity, as well as complexity theory, sta- tistics and information-theoretic security. He authored numerous papers related to security and applied statistics and decision theory in security. He (co-authored) the book “Cryptography for Security and Privacy in Cloud Computing", published by Artech House, and edited the Birkhäuser Book “Game Theory for Security and Risk Management: From Theory to Practice" in the series on Static & Dynamic Game Theory: Foundations & Applications. He participated in various nationally and internationally funded research projects, as well as being a contributing researcher in many EU projects and offering consultancy services to the industry. Currently, he is an associate professor at the AAU, teaching courses on algorithms and data structures, theoretical computer science, complexity theory, security and cryptography. Website: https://www.syssec.at/en/team/rass
Publisher Copyright:
© 2018 Copyright held by the owner/author(s).
PY - 2018/10/15
Y1 - 2018/10/15
N2 - The increasingly pervasive connectivity of today’s information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker’s advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory.
AB - The increasingly pervasive connectivity of today’s information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker’s advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory.
KW - Decision theory
KW - Defense strategy
KW - Game theory
KW - Mechanism design
KW - Network security
KW - Security economics
UR - http://www.scopus.com/inward/record.url?scp=85056816871&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85056816871&partnerID=8YFLogxK
U2 - 10.1145/3243734.3264421
DO - 10.1145/3243734.3264421
M3 - Conference contribution
AN - SCOPUS:85056816871
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 2163
EP - 2165
BT - CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
PB - Association for Computing Machinery
T2 - 25th ACM Conference on Computer and Communications Security, CCS 2018
Y2 - 15 October 2018
ER -