Decision and game theory for security [electronic resource] : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.)

This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from n...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: GameSec (Conference) College Park, MD)
Other Authors: Baras, John S., Katz, Jonathan, 1974-, Altman, Eitan
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2011.
Series:Lecture notes in computer science ; 7037.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Intro; Title; Preface; Organization; Table of Contents; Plenary Keynotes; Beyond Nash Equilibrium: Solution Concepts for the 21st Century; References; Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements; References; Attacks, Adversaries, and Game Theory; Indices of Power in Optimal IDS Default Configuration: Theory and Examples; Introduction; Related Work; IDS Performance Evaluation; Attack Graphs; Game-Theoretical Methods; Attacker and Detector Model; Cooperative Game Model; Shapley Values and B-C Index; An Example.
  • Multiple Attack Sequences and Multinear ExtensionMultilinear Extension (MLE); Multilinear Approximation; Optimal Default Configuration; An Example; Conclusion; References; Exploiting Adversary's Risk Profiles in Imperfect Information Security Games; Introduction; High Card; Game Parameters; A Round of Play; Sidepots; Round Resolution; Rules in a Nutshell; Examples; Diplomacy; Computer Security; Simulation; Probability of Winning; Utility Functions; Non-modeling Bots; Modeling Bot; Results; Conclusions; References; Wireless Adhoc and Sensor Networks.
  • An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksIntroduction; Problem Modeling and Solution; Numerical Results; Conclusions; Application to CR; References; Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks; Introduction; Background and Preliminaries; Network Model; Adversarial Model; Related Work on Distributed Clone Detection Model; Analytical Models of Node Capture Attacks; Linear Dynamical Model; Stochastic Model; A Game Theoretic Approach to Modeling Node Capture Attacks; Games Based on the Linear Dynamical Model.
  • Games Based on the Queueing ModelSimulation Results; Conclusion; References; Multi-variate Quickest Detection of Significant Change Process; Introduction; Detection of Disorder at Sensors; Formulation of the Problem; Construction of the Optimal Detection Strategy; The Aggregated Decision via the Cooperative Game; A Simple Game; The Aggregated Decision Rule; A Non-cooperative Stopping Game; The Finite Horizon Game; Infinite Horizon Game; Determining the Strategies of Sensors; Final Remarks; Algorithm; References; Network Games.
  • Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachIntroduction; Model; User Data Valuation; Security Systems Performance; The Attacker Point of View; User Preferences; User Equilibrium; Structure of a User Equilibrium; The Case of Several Providers with the Same Price; Game Equilibrium as a Solution of an Optimization Problem; Price of Anarchy of the User Game; Pricing Decisions of Security Providers; Licensed versus Free Security Provider; Competition among Providers: The Risk of Price War; Conclusions; References.