IIUM Repository

A comprehensive insight into game theory in relevance to cyber security

Anwar, Farhat and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Pampori, Bisma Rasool and Mir, Roohie Naaz (2020) A comprehensive insight into game theory in relevance to cyber security. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 8 (1). pp. 189-203. ISSN 2089-3272

[img] PDF - Published Version
Restricted to Registered users only

Download (712kB) | Request a copy
[img] PDF (SCOPUS) - Supplemental Material
Restricted to Registered users only

Download (217kB) | Request a copy

Abstract

The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.

Item Type: Article (Journal)
Additional Information: 3276/80084
Uncontrolled Keywords: Cybersecurity, Game theory, Security games, Game theory vs. cryptography
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics > QA273 Probabilities
T Technology > T Technology (General) > T10.5 Communication of technical information
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Kulliyyah of Engineering
Depositing User: Dr. Rashidah Funke Olanrewaju
Date Deposited: 22 May 2020 10:31
Last Modified: 22 May 2020 10:35
URI: http://irep.iium.edu.my/id/eprint/80084

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year