Decision and Game Theory for Security

Decision and Game Theory for Security
Author: Quanyan Zhu
Publisher: Springer
Total Pages: 479
Release: 2016-10-25
Genre: Computers
ISBN: 3319474138

This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.

Decision and Game Theory for Security

Decision and Game Theory for Security
Author: Branislav Bošanský
Publisher: Springer Nature
Total Pages: 385
Release: 2021-10-30
Genre: Computers
ISBN: 3030903702

This book constitutes the refereed proceedings of the 12th International Conference on Decision and Game Theory for Security, GameSec 2021,held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers presented were carefully reviewed and selected from 37 submissions. The papers focus on Theoretical Foundations in Equilibrium Computation; Machine Learning and Game Theory; Ransomware; Cyber-Physical Systems Security; Innovations in Attacks and Defenses.

Control and Game Theoretic Methods for Cyber-Physical Security

Control and Game Theoretic Methods for Cyber-Physical Security
Author: Aris Kanellopoulos
Publisher: Elsevier
Total Pages: 200
Release: 2024-05-24
Genre: Technology & Engineering
ISBN: 0443154090

Control-theoretic Methods for Cyber-Physical Security presents novel results on security and defense methodologies applied to cyber-physical systems. This book adopts the viewpoint of control and game theories, modelling these autonomous platforms as dynamical systems and proposing algorithmic frameworks that both proactively and reactively shield the system against catastrophic failures. The algorithms presented employ model-based and data-driven techniques to security, ranging from model-free detection mechanisms to unpredictability-based defense approaches.This book will be a reference to the research community in identifying approaches to security that go beyond robustification techniques and give attention to the tight interplay between the physical and digital devices of the system, providing algorithms that can be readily used in a variety of application domains where the systems are subject to different kinds of attacks. - Serves as a bibliography on different aspects of security in cyber-physical systems - Offers insights into security through innovative approaches, which amalgamate principles from diverse disciplines - Explores unresolved challenges in the security domain, examining them through the lens of rigorous formulations from control and game theory

Analysis and Design of Networked Control Systems under Attacks

Analysis and Design of Networked Control Systems under Attacks
Author: Yuan Yuan
Publisher: CRC Press
Total Pages: 278
Release: 2018-09-21
Genre: Computers
ISBN: 0429812280

This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive security control of the networked control systems. Because the cyber-physical system is a hybrid system, it adopts cross layer approach to handle the security control of the CPS. It presents a number of attack models according to the attack scenario and defense facilities, and a number of cross-layer co-design methodologies to secure the control of CPS.

Game Theory for Security and Risk Management

Game Theory for Security and Risk Management
Author: Stefan Rass
Publisher: Springer
Total Pages: 438
Release: 2018-07-06
Genre: Mathematics
ISBN: 3319752685

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

Game Theory for Cyber Deception

Game Theory for Cyber Deception
Author: Jeffrey Pawlick
Publisher: Springer Nature
Total Pages: 192
Release: 2021-01-30
Genre: Mathematics
ISBN: 3030660656

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Security of Cyber-Physical Systems: State Estimation and Control

Security of Cyber-Physical Systems: State Estimation and Control
Author: Chengwei Wu
Publisher: Springer Nature
Total Pages: 293
Release: 2021-10-19
Genre: Technology & Engineering
ISBN: 3030883507

This book analyzes the secure problems of cyber-physical systems from both the adversary and defender sides. Targeting the challenging security problems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers will find not only the valuable secure state estimation and control schemes combined with the approaches aforementioned, but also some vital conclusions for securing cyber-physical systems, for example, the critical value of allowed attack probability, the maximum number of sensors to be attacked, etc. The book also provides practical applications, example of which are unmanned aerial vehicles, interruptible power system, and robot arm to validate the proposed secure algorithms. Given its scope, it offers a valuable resource for undergraduate and graduate students, academics, scientists, and engineers who are working in this field.

Wide Area Monitoring, Protection and Control Systems

Wide Area Monitoring, Protection and Control Systems
Author: Alfredo Vaccaro
Publisher: IET
Total Pages: 200
Release: 2016-08-04
Genre: Technology & Engineering
ISBN: 1849198306

Wide area monitoring, protection and control systems (WAMPACs) have been recognized as the most promising enabling technologies to meet challenges of modern electric power transmission systems, where reliability, economics, environmental and other social objectives must be balanced to optimize the grid assets and satisfy growing electrical demand. To this aim WAMPAC requires precise phasor and frequency information, which are acquired by deploying multiple time synchronized sensors, known as Phasor Measurement Units (PMUs), providing precise synchronized information about voltage and current phasors, frequency and rate-of-change-of-frequency.

Control of Cyber-Physical Systems

Control of Cyber-Physical Systems
Author: Danielle C. Tarraf
Publisher: Springer
Total Pages: 379
Release: 2013-06-30
Genre: Technology & Engineering
ISBN: 3319011596

Cyber-physical systems (CPS) involve deeply integrated, tightly coupled computational and physical components. These systems, spanning multiple scientific and technological domains, are highly complex and pose several fundamental challenges. They are also critically important to society’s advancement and security. The design and deployment of the adaptable, reliable CPS of tomorrow requires the development of a basic science foundation, synergistically drawing on various branches of engineering, mathematics, computer science, and domain specific knowledge. This book brings together 19 invited papers presented at the Workshop on Control of Cyber-Physical Systems, hosted by the Department of Electrical & Computer Engineering at The Johns Hopkins University in March 2013. It highlights the central role of control theory and systems thinking in developing the theory of CPS, in addressing the challenges of cyber-trust and cyber-security, and in advancing emerging cyber-physical applications ranging from smart grids to smart buildings, cars and robotic systems.

Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security
Author: Charles A. Kamhoua
Publisher: John Wiley & Sons
Total Pages: 546
Release: 2021-09-08
Genre: Technology & Engineering
ISBN: 1119723949

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.