2005
DOI: 10.1007/11600930_98
|View full text |Cite
|
Sign up to set email alerts
|

A Graph-Theoretic Network Security Game

Abstract: Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multiplayer game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. Each attacker player chooses a node of the graph via a probability distribution to infect. The protector player chooses either an edge or a simple path … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
4
1
1

Relationship

4
2

Authors

Journals

citations
Cited by 24 publications
(28 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…In particular, we represent the network's topology using a graph and adopt a security game introduced in [MPPS05c]. According to this approach, the security threats and the potential defence mechanisms are realized by a set of confronting players on a graphical game.…”
Section: The Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…In particular, we represent the network's topology using a graph and adopt a security game introduced in [MPPS05c]. According to this approach, the security threats and the potential defence mechanisms are realized by a set of confronting players on a graphical game.…”
Section: The Methodsmentioning
confidence: 99%
“…3) Validation of the non-functional security requirement: We utilize the Nash equilibria identified and evaluated in [MPPS05c] to measure the security guarantee in the prospective network for both approaches. These represent a reduced set of test scenarios to be evaluated.…”
Section: The Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…An extensive collection of trade-offs between price of defense and the computational complexity of Nash equilibria is provided in the work of Mavronicolas et al [64]. Most interestingly, the work of Mavronicolas et al [64,[66][67][68] introduce certain natural classes of Nash equilibria for their network security game on graphs, including matching Nash equilibria [67,68] and perfect matching Nash equilibria [64]; they prove that deciding the existence of equilibria from such classes is precisely equivalent to the recognition problem for König-Egervary graphs [25,54]. So, this establishes a very interesting (and perhaps unexpected) link to some classical pearls in graph theory.…”
Section: A Network Security Gamementioning
confidence: 99%