4
Game Theory Meets Network Security A Tutorial Quanyan Zhu New York University Brooklyn, New York [email protected] Stefan Rass Universitaet Klagenfurt Klagenfurt, Austria [email protected] ABSTRACT The increasingly pervasive connectivity of today’s information sys- tems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost- prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, pre- diction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker’s advan- tage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theo- retic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory. CCS CONCEPTS Security and privacy Network security; Mathematics of computing; Theory of computation Algorithmic game theory and mechanism design; KEYWORDS Game theory, Network security, Defense strategy, Mechanism de- sign, Decision theory, Security economics ACM Reference Format: Quanyan Zhu and Stefan Rass. 2018. Game Theory Meets Network Secu- rity: A Tutorial. In CCS ’18: 2018 ACM SIGSAC Conference on Computer & Communications Security Oct. 15–19, 2018, Toronto, ON, Canada, Jennifer B. Sartor, Theo D’Hondt, and Wolfgang De Meuter (Eds.). ACM, New York, NY, USA, Article 4, 4 pages. https://doi.org/10.1145/3243734.3264421 Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). CCS ’18, October 15–19, 2018, Toronto, ON, Canada © 2018 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-5693-0/18/10. https://doi.org/10.1145/3243734.3264421 1 TUTORIAL DESCRIPTION Contemporary information and communication technology evolves fast not only in terms of the level of sophistication but also regard- ing its diversity. The increasing complexity, pervasiveness, and connectivity of today’s information systems brings up new chal- lenges to security, and the cyberspace has become a playground for people with all levels of skills and all kinds of intention (positive and negative). With 24/7 connectivity having become an integral part of people’s daily life, protecting information, identities, and as- sets has gained more importance than ever. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity (CIA+). Cryptography is a solid theoretic foundation for security which relies on the secrecy of cryptographic keys. However, for attackers who can steal full cryptographic keys as in advanced persistent threats (APTs) or social engineering attacks, the assumption of key secrecy fails, and they can penetrate the system. A new perspective and a new theoretical foundation are needed to capture scenarios where an attacker can completely compromise a system, and a de- fender aims to protect the system without the assumption of key secrecy. Game-theoretic models are natural frameworks to capture the adversarial and defensive interactions between players [9, 14, 15, 20, 21, 37, 66, 72, 77, 83]. Game theory can provide a quantitative measure of the quality of protection with the concept of Nash equi- librium where both defender and an attacker seek optimal strategies, and no one has an incentive to deviate unilaterally from their equi- librium strategies despite their conflict for security objectives. The equilibrium concept also provides a quantitative prediction of the security outcomes of the scenario the game model captures. With the quantitative measures of security, game theory makes security manageable beyond the strong qualitative assurances of crypto- graphic protections. Extending this approach to mechanism design provides system designers freedom to shift the equilibrium and the predicted outcomes toward ones that are favored by the defender or the system designer via an elaborate design of the game structure. For more than a decade now, the interest in the field has prolifer- ated, and game- and decision theory has become a systematic and well proven powerful theoretic underpinning of today’s security research. Somewhat different from standard security definitions, game- and decision theory adopts a different and more economic viewpoint: security is not the absence of threats, but the point where attacking a system has become more expensive than not attacking. Starting from a game- and decision-theoretic root thus achieves the most elegant type of self-enforcing security, by analyzing and creating incentives to encourage actively honest behaviors rather than preventing maliciousness. At the same time, the economic arXiv:1808.08066v1 [cs.CR] 24 Aug 2018

Game Theory Meets Network Security - arXiv

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Game Theory Meets Network Security - arXiv

Game Theory Meets Network SecurityA Tutorial

Quanyan Zhu

New York University

Brooklyn, New York

[email protected]

Stefan Rass

Universitaet Klagenfurt

Klagenfurt, Austria

[email protected]

ABSTRACTThe increasingly pervasive connectivity of today’s information sys-

tems brings up new challenges to security. Traditional security has

accomplished a long way toward protecting well-defined goals such

as confidentiality, integrity, availability, and authenticity. However,

with the growing sophistication of the attacks and the complexity of

the system, the protection using traditional methods could be cost-

prohibitive. A new perspective and a new theoretical foundation are

needed to understand security from a strategic and decision-making

perspective. Game theory provides a natural framework to capture

the adversarial and defensive interactions between an attacker and

a defender. It provides a quantitative assessment of security, pre-

diction of security outcomes, and a mechanism design tool that

can enable security-by-design and reverse the attacker’s advan-

tage. This tutorial provides an overview of diverse methodologies

from game theory that includes games of incomplete information,

dynamic games, mechanism design theory to offer a modern theo-

retic underpinning of a science of cybersecurity. The tutorial will

also discuss open problems and research challenges that the CCS

community can address and contribute with an objective to build a

multidisciplinary bridge between cybersecurity, economics, game

and decision theory.

CCS CONCEPTS• Security and privacy→Network security; •Mathematics ofcomputing; • Theory of computation → Algorithmic gametheory and mechanism design;

KEYWORDSGame theory, Network security, Defense strategy, Mechanism de-

sign, Decision theory, Security economics

ACM Reference Format:Quanyan Zhu and Stefan Rass. 2018. Game Theory Meets Network Secu-

rity: A Tutorial. In CCS ’18: 2018 ACM SIGSAC Conference on Computer &Communications Security Oct. 15–19, 2018, Toronto, ON, Canada, Jennifer B.Sartor, Theo D’Hondt, and Wolfgang De Meuter (Eds.). ACM, New York,

NY, USA, Article 4, 4 pages. https://doi.org/10.1145/3243734.3264421

Permission to make digital or hard copies of part or all of this work for personal or

classroom use is granted without fee provided that copies are not made or distributed

for profit or commercial advantage and that copies bear this notice and the full citation

on the first page. Copyrights for third-party components of this work must be honored.

For all other uses, contact the owner/author(s).

CCS ’18, October 15–19, 2018, Toronto, ON, Canada© 2018 Copyright held by the owner/author(s).

ACM ISBN 978-1-4503-5693-0/18/10.

https://doi.org/10.1145/3243734.3264421

1 TUTORIAL DESCRIPTIONContemporary information and communication technology evolves

fast not only in terms of the level of sophistication but also regard-

ing its diversity. The increasing complexity, pervasiveness, and

connectivity of today’s information systems brings up new chal-

lenges to security, and the cyberspace has become a playground for

people with all levels of skills and all kinds of intention (positive

and negative). With 24/7 connectivity having become an integral

part of people’s daily life, protecting information, identities, and as-

sets has gained more importance than ever. Traditional security has

accomplished a long way toward protecting well-defined goals such

as confidentiality, integrity, availability, and authenticity (CIA+).

Cryptography is a solid theoretic foundation for security which

relies on the secrecy of cryptographic keys. However, for attackers

who can steal full cryptographic keys as in advanced persistent

threats (APTs) or social engineering attacks, the assumption of key

secrecy fails, and they can penetrate the system. A new perspective

and a new theoretical foundation are needed to capture scenarios

where an attacker can completely compromise a system, and a de-

fender aims to protect the system without the assumption of key

secrecy.

Game-theoretic models are natural frameworks to capture the

adversarial and defensive interactions between players [9, 14, 15,

20, 21, 37, 66, 72, 77, 83]. Game theory can provide a quantitative

measure of the quality of protection with the concept of Nash equi-

libriumwhere both defender and an attacker seek optimal strategies,

and no one has an incentive to deviate unilaterally from their equi-

librium strategies despite their conflict for security objectives. The

equilibrium concept also provides a quantitative prediction of the

security outcomes of the scenario the game model captures. With

the quantitative measures of security, game theory makes security

manageable beyond the strong qualitative assurances of crypto-

graphic protections. Extending this approach to mechanism design

provides system designers freedom to shift the equilibrium and the

predicted outcomes toward ones that are favored by the defender or

the system designer via an elaborate design of the game structure.

For more than a decade now, the interest in the field has prolifer-

ated, and game- and decision theory has become a systematic and

well proven powerful theoretic underpinning of today’s security

research. Somewhat different from standard security definitions,

game- and decision theory adopts a different and more economic

viewpoint: security is not the absence of threats, but the point where

attacking a system has become more expensive than not attacking.

Starting from a game- and decision-theoretic root thus achieves

the most elegant type of self-enforcing security, by analyzing and

creating incentives to encourage actively honest behaviors rather

than preventing maliciousness. At the same time, the economic

arX

iv:1

808.

0806

6v1

[cs

.CR

] 2

4 A

ug 2

018

Page 2: Game Theory Meets Network Security - arXiv

approach to security is also essential as it parallels the evolution

of today’s attackers. Cybercrime has grown into a full-featured

economy, maintaining black markets, supply chains, and widely

resembling an illegal counterpart of the of the official software

market. Traditional security remains an important foundation to

tackle the issue from below, but game- and decision theory offers

a top-down view by adopting the economic and strategic view of

the attackers too, and as such complements purely technological

security means. The optimum is achieved when both routes are

taken towards meeting in the middle, which is what game and

decision theory aims to achieve.

The objective of this tutorial is to introduce diverse methodolo-

gies from game theory that include mechanism design, incentive

analysis, decision-making under incomplete information, and dy-

namic games to provide solid underpinnings of a science of cy-

bersecurity. The tutorial will be organized to connect different

classes of games with different sets of security problems. For ex-

ample (1) Stackelberg and multi-layer games for proactive defense

[8, 26, 68, 70–72, 76, 80, 82], (2) network games for cyber-physical se-

curity that deals with critical infrastructure protection and informa-

tion assurance [3, 15, 21, 36, 54, 56–60], (3) dynamic games for adap-

tive defense for network security [9, 16, 17, 24, 66, 67, 78, 79, 81], (4)

mechanism design theory for economics of network security that in-

vestigates resource allocation methodologies [2, 5, 11, 13, 61, 64, 73–

75], and (5) game-theoretic analysis of cryptographic concepts,

such as perfectly confidentiality and authentication (in classical

and quantum networks) [47–50], network design and -provisioning

[30–32, 45, 46, 53] and quantitative security risk management [33–

35, 38–44, 51, 52]

From the perspective of cybersecurity, the topics of this tutorial

will cover recent applications of game theory to several emerging

topics such as cross-layer cyber-physical security [6, 21, 29, 59, 69,

77], cyber deception [14, 22, 23, 25, 66, 83], moving target defense

[18, 19, 68], critical infrastructure protection [3, 4, 12, 15, 16, 28, 37],

adversarial machine learning [26, 27, 55, 62, 63], insider threats

[1, 2], and cyber risk management [7, 10, 13, 65]. The tutorial will

also discuss open problems and research challenges that the CCS

community can address and contribute. With the objective to build

a multidisciplinary bridge between cybersecurity, economics, game

and decision theory, this tutorial will review basic concepts and

provide an overview of recent advances in the field to CCS commu-

nity with the hope to establish a community interest in the science

of security and cross-disciplinary researches.

The potential audience includes researchers from academia and

industry, including PhD and graduate students. Some background

in network security and knowledge of basic optimization and data

science is helpful but not necessary. The tutorial takes 1.5 hours.

2 AUTHOR BIOGRAPHYQuanyan Zhu received B. Eng. in Hon-

ors Electrical Engineering from McGill

University in 2006, M.A.Sc. from Uni-

versity of Toronto in 2008, and Ph.D.

from the University of Illinois at Urbana-

Champaign (UIUC) in 2013. After stints

at Princeton University, he is currently

an assistant professor at the Department

of Electrical and Computer Engineering, New York University. He

is a recipient of many awards including NSERC Canada Graduate

Scholarship (CGS), Mavis Future Faculty Fellowships, and NSERC

Postdoctoral Fellowship (PDF). He spearheaded and chaired IN-

FOCOM Workshop on Communications and Control on Smart

Energy Systems (CCSES), and Midwest Workshop on Control and

Game Theory (WCGT). His current research interests include re-

silient and secure interdependent critical infrastructures, energy

systems, cyber-physical systems, and cyber-enabled sustainabil-

ity. He is a recipient of best paper awards at 5th International

Conference on Resilient Control Systems, and 18th International

Conference on Information Fusion. He has served as the general

chair of the 7th Conference on Decision and Game Theory for Secu-

rity (GameSec) in 2016 and International Conference on NETwork

Games, COntrol and OPtimisation (NETGCOOP) in 2018. Website:

http://wp.nyu.edu/quanyan

Stefan Rass graduated with a double

master degree in mathematics and com-

puter science from the Universitaet Kla-

genfurt in 2005. He received a PhD de-

gree in mathematics in 2009, and habil-

itated on applied computer science and

system security in 2014. His research in-

terests cover decision theory and game-

theory with applications in system se-

curity, as well as complexity theory, sta-

tistics and information-theoretic security. He authored numerous

papers related to security and applied statistics and decision the-

ory in security. He (co-authored) the book “Cryptography for Se-

curity and Privacy in Cloud Computing", published by Artech

House, and edited the Birkhäuser Book “Game Theory for Secu-

rity and Risk Management: From Theory to Practice" in the series

on Static & Dynamic Game Theory: Foundations & Applications.

He participated in various nationally and internationally funded

research projects, as well as being a contributing researcher in

many EU projects and offering consultancy services to the indus-

try. Currently, he is an associate professor at the AAU, teaching

courses on algorithms and data structures, theoretical computer

science, complexity theory, security and cryptography. Website:

https://www.syssec.at/en/team/rass

REFERENCES[1] Casey, W., Morales, J. A., Wright, E., Zhu, Q., and Mishra, B. Compliance sig-

naling games: toward modeling the deterrence of insider threats. Computationaland Mathematical Organization Theory 22, 3 (2016), 318–349.

[2] Casey, W. A., Zhu, Q., Morales, J. A., and Mishra, B. Compliance control:

Managed vulnerability surface in social-technological systems via signaling

games. In Proceedings of the 7th ACM CCS International Workshop on ManagingInsider Security Threats (2015), ACM, pp. 53–62.

[3] Chen, J., Touati, C., and Zhu, Q. A dynamic game analysis and design of

infrastructure network protection and recovery. ACM SIGMETRICS PerformanceEvaluation Review 45, 2 (2017), 128.

[4] Chen, J., and Zhu, Q. Interdependent network formation games with an appli-

cation to critical infrastructures. In American Control Conference (ACC), 2016(2016), IEEE, pp. 2870–2875.

[5] Chen, J., and Zhu, Q. Security as a Service for Cloud-Enabled Internet of Con-

trolled Things under Advanced Persistent Threats: A Contract Design Approach.

IEEE Transactions on Information Forensics and Security (2017).

[6] Chen, J., and Zhu, Q. Security as a service for cloud-enabled internet of controlled

things under advanced persistent threats: a contract design approach. IEEE

Page 3: Game Theory Meets Network Security - arXiv

Transactions on Information Forensics and Security 12, 11 (2017), 2736–2750.[7] Chen, J., and Zhu, Q. Security investment under cognitive constraints: A gestalt

nash equilibrium approach. In Information Sciences and Systems (CISS), 2018 52ndAnnual Conference on (2018), IEEE, pp. 1–6.

[8] Clark, A., Zhu, Q., Poovendran, R., and Başar, T. Deceptive routing in relay

networks. In Decision and Game Theory for Security. Springer, 2012, pp. 171–185.[9] Farhang, S., Manshaei, M. H., Esfahani, M. N., and Zhu, Q. A dynamic

bayesian security game framework for strategic defense mechanism design. In

Decision and Game Theory for Security. Springer, 2014, pp. 319–328.[10] Fung, C. J., and Zhu, Q. Facid: A trust-based collaborative decision framework

for intrusion detection networks. Ad Hoc Networks 53 (2016), 17–31.[11] Hayel, Y., and Zhu, Q. Attack-aware cyber insurance for risk sharing in computer

networks. In Decision and Game Theory for Security. Springer, 2015, pp. 22–34.[12] Hayel, Y., and Zhu, Q. Resilient and secure network design for cyber attack-

induced cascading link failures in critical infrastructures. In Information Sciencesand Systems (CISS), 2015 49th Annual Conference on (2015), IEEE, pp. 1–3.

[13] Hayel, Y., and Zhu, Q. Epidemic protection over heterogeneous networks using

evolutionary poisson games. IEEE Transactions on Information Forensics andSecurity 12, 8 (2017), 1786–1800.

[14] Horák, K., Zhu, Q., and Bošansky, B. Manipulating adversary?s belief: A

dynamic game approach to deception by design for proactive network security.

In International Conference on Decision and Game Theory for Security (2017),

Springer, pp. 273–294.

[15] Huang, L., Chen, J., and Zhu, Q. A large-scale markov game approach to

dynamic protection of interdependent infrastructure networks. In InternationalConference on Decision and Game Theory for Security (2017), Springer, pp. 357–376.

[16] Huang, L., and Zhu, Q. Adaptive strategic cyber defense for advanced persistent

threats in critical infrastructure networks. In ACM SIGMETRICS PerformanceEvaluation Review (2018).

[17] Huang, L., and Zhu, Q. Analysis and computation of adaptive defense strategies

against advanced persistent threats for cyber-physical systems. In InternationalConference on Decision and Game Theory for Security (2018).

[18] Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., and Wang, X. S. Moving targetdefense: creating asymmetric uncertainty for cyber threats, vol. 54. Springer Science& Business Media, 2011.

[19] Maleki, H., Valizadeh, S., Koch, W., Bestavros, A., and van Dijk, M. Markov

modeling of moving target defense games. In Proceedings of the 2016 ACMWorkshop on Moving Target Defense (2016), ACM, pp. 81–92.

[20] Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., and Hubaux, J.-P. Game

theory meets network security and privacy. ACM Computing Surveys (CSUR) 45,3 (2013), 25.

[21] Miao, F., Zhu, Q., Pajic, M., and Pappas, G. J. A hybrid stochastic game for

secure control of cyber-physical systems. Automatica 93 (2018), 55–63.[22] Pawlick, J., Colbert, E., and Zhu, Q. A game-theoretic taxonomy and survey of

defensive deception for cybersecurity and privacy. arXiv preprint arXiv:1712.05441(2017).

[23] Pawlick, J., Colbert, E., and Zhu, Q. Modeling and analysis of leaky deception

using signaling games with evidence. arXiv preprint arXiv:1804.06831 (2018).[24] Pawlick, J., Farhang, S., and Zhu, Q. Flip the cloud: Cyber-physical signaling

games in the presence of advanced persistent threats. In Decision and GameTheory for Security. Springer, 2015, pp. 289–308.

[25] Pawlick, J., and Zhu, Q. Deception by design: evidence-based signaling games

for network defense. arXiv preprint arXiv:1503.05458 (2015).[26] Pawlick, J., and Zhu, Q. A Stackelberg game perspective on the conflict between

machine learning and data obfuscation. In Information Forensics and Security(WIFS), 2016 IEEE International Workshop on (2016), IEEE, pp. 1–6.

[27] Pawlick, J., and Zhu, Q. A Mean-Field Stackelberg Game Approach for Obfus-

cation Adoption in Empirical Risk Minimization. arXiv preprint arXiv:1706.02693(2017).

[28] Pawlick, J., and Zhu, Q. Proactive defense against physical denial of service

attacks using poisson signaling games. In International Conference on Decisionand Game Theory for Security (2017), Springer, pp. 336–356.

[29] Pawlick, J., and Zhu, Q. Strategic trust in cloud-enabled cyber-physical systems

with an application to glucose control. IEEE Transactions on Information Forensicsand Security 12, 12 (2017), 2906–2919.

[30] Rass, S. Information-Theoretic Security as an Optimization Problem. Journal ofNext Generation Information Technology 2, 3 (2011), 72–83. August, 31st.

[31] Rass, S. On Game-Theoretic Network Security Provisioning. Springer Journal ofNetwork and Systems Management 21, 1 (2013), 47–64.

[32] Rass, S. Complexity of Network Design for Private Communication and the P-vs-

NP question. International Journal of Advanced Computer Science and Applications5, 2 (2014), 148–157.

[33] Rass, S. On Game-Theoretic Risk Management (Part One) – Towards a Theory

of Games with Payoffs that are Probability-Distributions. ArXiv e-prints (2015).http://arxiv.org/abs/1506.07368.

[34] Rass, S. On Game-Theoretic Risk Management (Part Two) – Algorithms

to Compute Nash-Equilibria in Games with Distributions as Payoffs, 2015.

arXiv:1511.08591.

[35] Rass, S. On Game-Theoretic Risk Management (Part Three) - Modeling and

Applications, 2017.

[36] Rass, S., Alshawish, A., Abid, M. A., Schauer, S., Zhu, Q., and de Meer, H.

Physical Intrusion Games - Optimizing Surveillance by Simulation and Game

Theory. IEEE Access (2017), 1.[37] Rass, S., Alshawish, A., Abid, M. A., Schauer, S., Zhu, Q., and De Meer, H.

Physical intrusion games–optimizing surveillance by simulation and game theory.

IEEE Access 5 (2017), 8394–8407.[38] Rass, S., and König, S. R Package ’HyRiM’: Multicriteria Risk Management using

Zero-Sum Games with vector-valued payoffs that are probability distributions,

2017.

[39] Rass, S., and König, S. Password Security as a Game of Entropies. Entropy 20, 5(2018), 312.

[40] Rass, S., König, S., and Schauer, S. Uncertainty in Games: Using Probability

Distributions as Payoffs: 346–357. In Decision and Game Theory for Security, 6thInternational Conference, GameSec 2015 (2015), M. H. Khouzani, E. Panaousis, and

G. Theodorakopoulos, Eds., LNCS 9406, Springer.

[41] Rass, S., König, S., and Schauer, S. Decisions with Uncertain Consequences-A

Total Ordering on Loss-Distributions. PLoS ONE 11, 12 (2016), e0168583. JournalArticle.

[42] Rass, S., Konig, S., and Schauer, S. Defending Against Advanced Persistent

Threats Using Game-Theory. PLoS ONE 12, 1 (2017), e0168675. Journal Article.[43] Rass, S., König, S., and Schauer, S. On the Cost of Game Playing: How to

Control the Expenses in Mixed Strategies. In Decision and Game Theory forSecurity. Springer, [S.l.], 2017, pp. 494–505.

[44] Rass, S., and Rainer, B. Numerical Computation of Multi-Goal Security Strate-

gies. In Decision and Game Theory for Security (2014), R. Poovendran andW. Saad,

Eds., LNCS 8840, Springer, pp. 118–133.

[45] Rass, S., Rainer, B., Vavti, M., Göllner, J., Peer, A., and Schauer, S. Secure

Communication over Software-Defined Networks. Mobile Networks and Applica-tions 20, 1 (2015), 105–110. Rass, S., Rainer, B., Vavti, M., Göllner, J., Peer, A. and

Schauer, S.; Secure Communication over Software-Defined Networks. Mobile

Networks and Applications, Vol. 20, No. 1, 2015, pp. 105-110.

[46] Rass, S., Rainer, B., Vavti, M., and Schauer, S. A Network Modeling and

Analysis Tool for Perfectly Secure Communication. In Proceedings of the 27th IEEEInternational Conference on Advanced Information Networking and Applications(2013), IEEE Computer Society Press, pp. 267–275.

[47] Rass, S., and Schartner, P. Game-Theoretic Security Analysis of Quantum

Networks. In Proceedings of the Third International Conference on Quantum, Nanoand Micro Technologies (2009), IEEE Computer Society, pp. 20–25.

[48] Rass, S., and Schartner, P. Multipath Authentication without shared Secrets

and with Applications in Quantum Networks. In Proceedings of the Interna-tional Conference on Security and Management (SAM) (2010), vol. 1, CSREA Press,

pp. 111–115.

[49] Rass, S., and Schartner, P. A unified framework for the analysis of availability,

reliability and security, with applications to quantum networks. IEEE Transactionson Systems, Man, and Cybernetics – Part C: Applications and Reviews 41, 1 (2011),107–119.

[50] Rass, S., and Schartner, P. Information-Leakage in Hybrid Randomized Proto-

cols. In Proceedings of the International Conference on Security and Cryptography(SECRYPT) (2011), J. Lopez and P. Samarati, Eds., SciTePress – Science and Tech-

nology Publications, pp. 134–143.

[51] Rass, S., Schartner, P., and Wigoutschnigg, R. Decision Support Systems:

Security as a Game – Decisions from incomplete Models. Intech, 2010, pp. 391–

406.

[52] Rass, S., and Schauer, S., Eds. Game Theory for Security and Risk Management:From Theory to Practice. Springer Birkhäuser, 2018.

[53] Rass, S., Wiegele, A., and Schartner, P. Building a Quantum Network: How

to Optimize Security and Expenses. Springer Journal of Network and SystemsManagement 18, 3 (2010), 283–299. (published online: 23 March 2010).

[54] Rass, S., and Zhu, Q. GADAPT: A Sequential Game-Theoretic Framework for

Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. In

Decision and Game Theory for Security, Q. Zhu, T. Alpcan, E. Panaousis, M. Tambe,

and W. Casey, Eds., vol. 9996 of Lecture Notes in Computer Science. SpringerInternational Publishing, Cham, 2016, pp. 314–326.

[55] Wang, W., and Zhu, Q. On the detection of adversarial attacks against deep

neural networks. In Proceedings of the 2017 Workshop on Automated DecisionMaking for Active Cyber Defense (2017), ACM, pp. 27–30.

[56] Xu, Z., and Zhu, Q. A cyber-physical game framework for secure and resilient

multi-agent autonomous systems. In Decision and Control (CDC), 2015 IEEE 54thAnnual Conference on (2015), IEEE, pp. 5156–5161.

[57] Xu, Z., and Zhu, Q. Cross-layer secure cyber-physical control system design for

networked 3d printers. In American Control Conference (ACC), 2016 (2016), IEEE,pp. 1191–1196.

[58] Xu, Z., and Zhu, Q. A Game-Theoretic Approach to Secure Control of

Communication-Based Train Control Systems Under Jamming Attacks. In Pro-ceedings of the 1st International Workshop on Safe Control of Connected and Au-tonomous Vehicles (2017), ACM, pp. 27–34.

Page 4: Game Theory Meets Network Security - arXiv

[59] Xu, Z., and Zhu, Q. Secure and practical output feedback control for cloud-

enabled cyber-physical systems. In Communications and Network Security (CNS),2017 IEEE Conference on (2017), IEEE, pp. 416–420.

[60] Yuan, Y., Zhu, Q., Sun, F., Wang, Q., and Basar, T. Resilient control of cyber-

physical systems against denial-of-service attacks. In Resilient Control Systems(ISRCS), 2013 6th International Symposium on (2013), IEEE, pp. 54–59.

[61] Zhang, R., and Zhu, Q. Attack-Aware Cyber Insurance of Interdependent

Computer Networks.

[62] Zhang, R., and Zhu, Q. A game-theoretic defense against data poisoning attacks

in distributed support vector machines. In Decision and Control (CDC), 2017 IEEE56th Annual Conference on (2017), IEEE, pp. 4582–4587.

[63] Zhang, R., and Zhu, Q. A game-theoretic approach to design secure and resilient

distributed support vector machines. IEEE Transactions on Neural Networks andLearning Systems (2018).

[64] Zhang, R., Zhu, Q., and Hayel, Y. A Bi-Level Game Approach to Attack-Aware

Cyber Insurance of Computer Networks. IEEE Journal on Selected Areas inCommunications 35, 3 (2017), 779–794.

[65] Zhang, R., Zhu, Q., and Hayel, Y. A bi-level game approach to attack-aware

cyber insurance of computer networks. IEEE Journal on Selected Areas in Com-munications 35, 3 (2017), 779–794.

[66] Zhang, T., and Zhu, Q. Strategic defense against deceptive civilian gps spoofing

of unmanned aerial vehicles. In International Conference on Decision and GameTheory for Security (2017), Springer, pp. 213–233.

[67] Zhu, Q., and Başar, T. Dynamic policy-based ids configuration. In Decision andControl, 2009 held jointly with the 2009 28th Chinese Control Conference. CDC/CCC2009. Proceedings of the 48th IEEE Conference on (2009), IEEE, pp. 8600–8605.

[68] Zhu, Q., and Başar, T. Game-theoretic approach to feedback-driven multi-stage

moving target defense. In International Conference on Decision and Game Theoryfor Security (2013), Springer, pp. 246–263.

[69] Zhu, Q., and Basar, T. Game-theoretic methods for robustness, security, and

resilience of cyberphysical control systems: games-in-games principle for optimal

cross-layer resilient control systems. Control Systems, IEEE 35, 1 (2015), 46–65.[70] Zhu, Q., Bushnell, L., and Basar, T. Game-theoretic analysis of node capture

and cloning attack with multiple attackers in wireless sensor networks. In

Decision and Control (CDC), 2012 IEEE 51st Annual Conference on (2012), IEEE,

pp. 3404–3411.

[71] Zhu, Q., Clark, A., Poovendran, R., and Basar, T. Deceptive routing games.

In Decision and Control (CDC), 2012 IEEE 51st Annual Conference on (2012), IEEE,

pp. 2704–2711.

[72] Zhu, Q., Clark, A., Poovendran, R., and Basar, T. Deployment and exploitation

of deceptive honeybots in social networks. In Decision and Control (CDC), 2013IEEE 52nd Annual Conference on (2013), IEEE, pp. 212–219.

[73] Zhu, Q., Fung, C., Boutaba, R., and Başar, T. A game-theoretical approach

to incentive design in collaborative intrusion detection networks. In GameTheory for Networks, 2009. GameNets’ 09. International Conference on (2009), IEEE,

pp. 384–392.

[74] Zhu, Q., Fung, C., Boutaba, R., and Başar, T. Guidex: A game-theoretic

incentive-based mechanism for intrusion detection networks. Selected Areasin Communications, IEEE Journal on 30, 11 (2012), 2220–2230.

[75] Zhu, Q., Gunter, C. A., and Basar, T. Tragedy of anticommons in digital right

management of medical records. In HealthSec (2012).[76] Zhu, Q., Li, H., Han, Z., and Basar, T. A stochastic game model for jamming in

multi-channel cognitive radio systems. In ICC (2010), pp. 1–6.

[77] Zhu, Q., and Rass, S. On multi-phase and multi-stage game-theoretic modeling

of advanced persistent threats. IEEE Access 6 (2018), 13958–13971.[78] Zhu, Q., Tembine, H., and Başar, T. Heterogeneous learning in zero-sum

stochastic games with incomplete information. In Decision and Control (CDC),2010 49th IEEE Conference on (2010), IEEE, pp. 219–224.

[79] Zhu, Q., Tembine, H., and Basar, T. Network security configurations: A nonzero-

sum stochastic game approach. InAmerican Control Conference (ACC), 2010 (2010),IEEE, pp. 1059–1064.

[80] Zhu, Q., Tembine, H., and Basar, T. Hybrid learning in stochastic games and

its applications in network security. Reinforcement Learning and ApproximateDynamic Programming for Feedback Control (2013), 305–329.

[81] Zhu, Q., Yuan, Z., Song, J. B., Han, Z., and Basar, T. Dynamic interference

minimization routing game for on-demand cognitive pilot channel. In GlobalTelecommunications Conference (GLOBECOM 2010), 2010 IEEE (2010), IEEE, pp. 1–

6.

[82] Zhu, Q., Yuan, Z., Song, J. B., Han, Z., and Başar, T. Interference aware routing

game for cognitive radio multi-hop networks. Selected Areas in Communications,IEEE Journal on 30, 10 (2012), 2006–2015.

[83] Zhuang, J., Bier, V. M., and Alagoz, O. Modeling secrecy and deception in a

multiple-period attacker–defender signaling game. European Journal of Opera-tional Research 203, 2 (2010), 409–418.