GAME THEORY BASED SOLUTION FOR NETWORK SECURITY

Raghad I. Hussein Faculty of pharmacy university of Kufa, Najaf, Iraq
Nasrullah Pirzada Department of Telecommunication Engineering, Mehran University of Engineering and Technology, Jamshoro, Pakistan
Saleem Raza Quaid-e-Awam University of Engineering, Science and Technology, Larkana, Pakistan
Saif ullah Memon Department of Information Technology, QUEST, Nawabshah
Sijjad Ali Khuhro School of Computer Science and Technology, University of Science and Technology of China, Hefei, China

Abstract

Today in this modern age, network security is the hottest and trendy topic of research. Features of network security globally change due to rapid developments in computer networks, mobile applications and wireless computer networks. Open computer system networks do not have any protection and privacy due to fraudulent attacks and the Internet attacks on computer networks or an organization. Network security can be maintained through the firewalls and encryption software’s. Many organizations developed intranet to remain connected with network for their business. In this paper, we will try to cover network security issues by applying game theory on network security model. Ongoing occurrences in the Internet, demonstrate that network threats can make huge measures of disaster for governments, private undertakings, and the overall population in wording of cash, information privacy, and authorization. This paper presents the game theories that handle the network security issues by implementing different models and constructs that makes the network more reliable and sufficient. The main focus of the paper is the implementation of game theories to the network security models. The analysis of the game theory in the computer network security helps to find the best and optimal solutions for securing the network. Basic techniques for securing computer networks are anti-virus, data encryption, intrusion detection and firewall techniques but in this paper, gaming theory implemented to network security for securing the network through hackers and protect the system through viruses. Intrusion Detection Systems are used in game theory that will eliminate the danger and threats through the clients’ networks.

Keywords:

:

: Cyber security, Network security, Intrusion Detection Systems (IDSs), Game theory, Security threats,

Full Text:

PDF


References


References: [1] E. Bursztein and J. Goubalt-Larrecq. A logical framework for evaluating network resilience against faults and attacks. Lecture Notes in Computer Science; Vol. 4846, 2007. [2] W. Sun, X. Kong, D. He, and X. You. Information security problem research based on game theory. International Symposium on Publication Electronic Commerce and Security, 2008. [3] S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari. The role of game theory in information warfare. Proceedings of the 4 th information survivability workshop (ISW2001/2002), 2002. [4] M. Kjaerland. A taxonomy and comparison of computer security incidents from the commercial and government sectors. Computers and Security, 25:522–538, October 2005. [5] S. Hansman and R. Hunt. A taxonomy of network and computer attacks. Computers and Security, 24:31–43, February 2005. [6] A. Chakrabarti and G. Manimaran. Internet infrastructure security: A taxonomy. IEEE Network, 16:13, November 2002. [7] A. Alazzawe, A. Nawaz, and M. M. Bayaraktar. Game theory and intrusion detection systems. http://theory.stanford.edu/˜iliano/courses/06S GMUISA767/project/papers/alazzawe-mehmet-nawaz.pdf, 2006 [8] J. Jormakka and J. V. E. Molsa. Modelling information warfare as a game. Journal of Information Warfare; Vol. 4(2), 2005. [9] Y. Liu, C. Comaniciu, and H. Man. A bayesian game approach for intrusion detection in wireless ad hoc networks. ACM International Conference Proceeding Series; Vol. 199, 2006. [10] T. Alpcan and T. Baser. A game theoretic analysis of intrusion detection in access control systems. Proc. of the 43rd IEEE Conference on Decision and Control, 2004.

Refbacks

  • There are currently no refbacks.