2005
DOI: 10.1007/11602613_30
|View full text |Cite
|
Sign up to set email alerts
|

Network Game with Attacker and Protector Entities

Abstract: Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. Opponent to the attackers is the system protector scanning and cleaning from attackers some part of the network (e.g., an edge or a path), which it chooses independently using another probability distribution. Each attacker wishes to maximize the probability of escaping its cleaning by the system protector; towards a conflicting objec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
29
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 14 publications
(30 citation statements)
references
References 9 publications
1
29
0
Order By: Relevance
“…Thus, in order to evaluate network security we evaluate the Nash equilibria of the game of [MPPS05c,MPPS05b]. Indeed they showed a result which is interpreted in our terms as follows: The result combined with equation (1) above implies that the network of Figure 1 has security level equal to 2/n100=2/8100=25, since n=8.…”
Section: Example Of the K-edges-protection Gamementioning
confidence: 98%
See 3 more Smart Citations
“…Thus, in order to evaluate network security we evaluate the Nash equilibria of the game of [MPPS05c,MPPS05b]. Indeed they showed a result which is interpreted in our terms as follows: The result combined with equation (1) above implies that the network of Figure 1 has security level equal to 2/n100=2/8100=25, since n=8.…”
Section: Example Of the K-edges-protection Gamementioning
confidence: 98%
“…Recent work by [KO04,ACY05] and [MPPS05b,MPPS05c], initiated the introduction of strategic games on graphs (and the study of their associated Nash equilibria) as a means of studying security problems in networks with selfish entities. By selfish we mean that each entity in the game aims to maximize its utility.…”
Section: Wwwintechopencommentioning
confidence: 99%
See 2 more Smart Citations
“…An extensive collection of trade-offs between price of defense and the computational complexity of Nash equilibria is provided in the work of Mavronicolas et al [64]. Most interestingly, the work of Mavronicolas et al [64,[66][67][68] introduce certain natural classes of Nash equilibria for their network security game on graphs, including matching Nash equilibria [67,68] and perfect matching Nash equilibria [64]; they prove that deciding the existence of equilibria from such classes is precisely equivalent to the recognition problem for König-Egervary graphs [25,54]. So, this establishes a very interesting (and perhaps unexpected) link to some classical pearls in graph theory.…”
Section: A Network Security Gamementioning
confidence: 99%