A Review of Attacker–Defender Games and Cyber Security
Abstract
:1. Introduction
2. This Article’s Contribution beyond Earlier Reviews
3. Defense and Attack
3.1. One Player Defending or Attacking One Component in a System
3.2. Multiple Attackers and/or Multiple Defenders
3.3. Multiple-Period Attacker–Defender Games
4. Various Characteristics of Defense and Attack
4.1. Security Screening and Inspection
4.2. Detecting Invaders
4.3. Defense through Jamming and Eavesdropping
5. Defender–Attacker Games with Incomplete Information
5.1. Overview
5.2. Protecting Many Targets
5.3. Secrecy and Deception
5.4. Threat Propagation, Denial of Service Attacks, and False Alarms
5.5. Trust and Reputation
6. Information Sharing and Security Investment in Cyber Security
7. Cyber Stockpiling, Deterrence, Resilience, and Stackelberg and Repeated Games
7.1. Stockpiling of Cyber Munitions
7.2. Cyber Deterrence
7.3. Cyber Resilience
7.4. Cyber Security Stackelberg Games
7.5. Cyber Security Games for Power Systems
8. Stochastic Cyber Security Games
9. Cyber Security Games on Traffic and Transportation
10. Cyber Security Education and Board Games
11. Strengths, Weaknesses, Opportunities, and Future Research
- Multiple objectives: Utility functions should be developed focusing on the worst- and best-case scenarios, minimizing the costs, maximizing the benefits or security, weighing human vs. economic vs. symbolic value, and weighing multiple objectives against each other.
- Incomplete information: Games should account for players being uncertain about their surroundings and the future, including other players’ preferences and beliefs.
- Mixed strategies: Games should focus on players choosing strategies probabilistically.
- Stochastic games: Randomness should be incorporated into the players’ strategies and their surroundings.
- The time dimension: Repeated and dynamic games should be developed accounting for new events and information, where adversaries react to each other in various sequences.
- Complexity: Models should account for increasingly complex cyber security challenges, develop more efficient solution methods, utilize increasingly available supercomputers to solve large-scale problems, and question the available strategies, utility combinations, and the games that players play.
- Empirical support: The models should be tested experimentally and in real-life settings to ensure their realism, validation, and practical implementation.
- Behavioral game theory: Theory and empirics should be combined to ensure the increased realism of economic, political, and social interactions, accounting for bounded rationality and risk attitudes.
- Learning: How players learn in a novel field such as cyber security should be analyzed, accounting for the adaptation, reinforcement, and adjustment of strategies, preferences, and beliefs.
- Cooperative games: How players form coalitions to share costs and benefits and obtain cyber security should be scrutinized.
- Interdisciplinarity: Game theory should be combined with other disciplines within the technological, natural, social, and human sciences to obtain more holistic insights. Examples of disciplines include Internet of Things security, 5G and next-generation network security, artificial intelligence, machine learning, quantum computing, cryptography, blockchain and distributed ledger technology, zero-trust architectures, privacy-enhancing technologies, cyber–physical systems, user education and awareness, psychological profiling, advanced threat intelligence, and frameworks for regulation, compliance, adaptation, resilience, and recovery.
12. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A. Players and Phenomena in the Reviewed Articles
Reference | Players | Phenomena | |
---|---|---|---|
1 | Acemoglu, Malekian and Ozdaglar [81] | Multiple agents, one attacker | Network security investment against contagious infection |
2 | Ackerman, Zhuang and Weerasuriya [14] | Extremist groups, Western societies | Terrorist collaboration |
3 | Alpcan and Basar [80] | One defender, one attacker | Stochastic network intrusion detection |
4 | Amin and Johansson [1] | Multiple players | Review: Cyber security |
5 | Backhaus, Bent, Bono, Lee, Tracey, Wolpert, Xie and Yildiz [98] | One defender, one attacker | Defense against a cyber–physical intruder with attack-resilient smart grids |
6 | Baliga, De Mesquita and Wolitzky [95] | Multiple attackers, one victim | Victim is uncertain about attributing an attack to an attacker |
7 | Bandyopadhyay, Jacob and Raghunathan [75] | Two firms | Tightly integrated communication networks and supply chains increase security investment |
8 | Banks, Gallego, Naveiro and Ríos Insua [51] | One defender, one attacker | Adversarial risk analysis: An overview |
9 | Bier [52] | One defender, one attacker | Attacker with unknown preferences attacking one of many targets |
10 | Bier, Oliveros and Samuelson [53] | One defender, one attacker | Attacker with unknown preferences attacking one of many targets |
11 | Brown, Kline, Thomas, Washburn and Wood [33] | One defender, one attacker | Applying ships, aircraft, etc., to defend against submarine attacks. |
12 | Brown, Carlyle, Harney, Skroch and Wood [31] | One defender, one attacker | Max–min analysis of critical path to interdict nuclear-weapons project |
13 | Clarke and Knake [92] | Multiple players | Cyber war |
14 | Cone, Irvine, Thompson and Nguyen [119] | Multiple players | Interactive video game to build cyber security awareness |
15 | Crosston [90] | Multiple players | Mutually assured debilitation to ensure cyber deterrence |
16 | Dighe, Zhuang and Bier [43] | Two defenders, one attacker | Attack deterrence through secretive centralized or decentralized defense |
17 | Do, Tran, Hong, Kamhoua, Kwiat, Blasch, Ren, Pissinou and Iyengar [2] | Multiple players | Review: Cyber security |
18 | Dong, Chen, Hunt and Zhuang [47] | One defender, one attacker | Forecast information and risk control in defensive resource allocation |
19 | Dresher [87] | Multiple players | Games of strategy |
20 | Edwards, Furnas, Forrest and Axelrod [94] | One attacker, one victim | Victim is uncertain about attributing an attack to an attacker |
21 | Etesami and Basar [3] | Multiple players | Review: Cyber–physical systems |
22 | Frey, Rashid, Anthonysamy, Pinto-Albuquerque and Naqvi [120] | Multiple players | Tabletop game to experiment with security risks |
23 | Futter [121] | Multiple players | War games for cyberthreats, nuclear security, and arms control |
24 | Gal-Or and Ghose [66] | Two firms, one social planner | Information sharing and security investment as strategic complements |
25 | Gao and Shi [102] | One defender, one attacker | Defender–attacker–defender game for cyber–physical power systems |
26 | Garnaev, Baykal-Gursoy and Poor [38] | One defender, one attacker | Stochastic communication subject to jamming and eavesdropping |
27 | Gerald, Matthew, Ahmad and Jeffrey [32] | One defender, one attacker | Port radar surveillance of speedboats |
28 | Gordon, Loeb and Lucyshyn [65] | Two firms | Information sharing, security investment, free-riding |
29 | Guikema and Aven [4] | Multiple players | Review: Risk from various perspectives |
30 | Gupta, Langbort and Basar [61] | One defender, one attacker | Asymmetric information in a cyber–physical system |
31 | Han and Choi [64] | One defender, one attacker | Attacker mimics a normal user in a cyber system |
32 | Han and Choi [62] | One defender, one attacker | Penalizing a defender for false alarms in a cyber security intrusion detection system |
33 | Haphuriwat, Bier and Willis [30] | One defender, one attacker | Inspection, deterrence, and retaliation in smuggling |
34 | Harta, Margheri, Paci and Sassonea [122] | Multiple players | Cyber security awareness and education tabletop game |
35 | Hausken [13] | Multiple players | Probabilistic risk analysis, different system configurations |
36 | Hausken [67] | Two firms, one attacker, one social planner | Information sharing and security investment as strategic substitutes |
37 | Hausken [54] | One defender, one attacker | Attacker’s resources and target valuations are probabilistic |
38 | Hausken [68] | Two hackers, one firm | Information sharing, attack, free-riding, complements, substitutes |
39 | Hausken [69] | Two hackers, one firm | Information sharing, four-period game, deterrence |
40 | Hausken [70] | Two hackers, two firms | Information sharing, four-period game, deterrence |
41 | Hausken [135] | One defender, one attacker | Special versus general protection and attack of parallel and series components |
42 | Hausken [71] | Two hackers, one firm | Information sharing, proactive and retroactive defense, four-period game |
43 | Hausken [5] | Multiple players | Review: Cyber resilience |
44 | Hausken [6] | Multiple players | Review: Attack and defense for various systems |
45 | Hausken and Levitin [7] | Multiple players | Review: Defense and attack in reliability systems |
46 | Hausken and Welburn [84] | Two players | Zero-day attacks with stockpiling |
47 | Hausken and Zhuang [22] | One defender, one attacker | Stockpiling terrorist |
48 | Hausken and Zhuang [21] | One defender, one attacker | Stockpiling terrorist |
49 | Hausken and Zhuang [19] | One defender, one attacker | T periods, random resource determination |
50 | Hausken and Zhuang [23] | One defender, one attacker | Terrorist chooses when to attack and can be deterred |
51 | He and Zhuang [56] | One government, one terrorist | Contracts or mutually beneficial arrangements to deter attacks |
52 | He, Devine and Zhuang [72] | Decision-theoretic | Information sharing, public–private partnership, cost–benefit analysis |
53 | Hu, Liu, Chen, Zhang and Liu [104] | One defender, one attacker | Stochastic evolution of cyber security |
54 | Huang, Zhou, Qin and Tu [105] | One defender, one attacker | Stochastic analysis of cyber–physical system |
55 | Hunt, Agarwal and Zhuang [59] | One defender, one attacker | Technology adoption and disclosure of secrecy in airport security |
56 | Hunt and Zhuang [8] | Multiple players | Review: Attack and defense within different systems |
57 | Huo, Dong, Qian and Jing [114] | Multiple players | Vehicular cyber–physical coalition formation game |
58 | Jasper [93] | Multiple players | Deterring malicious behavior in cyberspace |
59 | Jensen [91] | Multiple players | Cyber deterrence |
60 | Jin, Zhang, Hu, Zhang and Sun [123] | One defender, one attacker | Reinforcement learning denial of service analysis in cyber–physical system |
61 | Jose and Zhuang [20] | One defender, one attacker | Technology adoption and accumulation in multiple periods |
62 | Kanellopoulos and Vamvoudakis [124] | Multiple players | Cyber–physical dynamic security training game, bounded rationality, level-k intelligence |
63 | Kolokoltsov and Bensoussan [106] | Multiple defenders, one hacker | Mean-field stochastic analysis of cyber security |
64 | Kott, Swami and McDaniel [9] | Multiple players | Review: Cyber game changers |
65 | Kovenock and Roberson [82] | One defender, one attacker | Multiple networks with intra-network strategic complementarities among targets |
66 | Levitin, Hausken, Taboada and Coit [73] | One defender, one attacker | Information storage in multiple blocks with maximum number of copies of each block |
67 | Li, Chen, Huang, Yao, Xia and Mei [103] | Multiple players | Evolutionary competition between virus propagation to protect cyber nodes within power systems |
68 | Li and Xu [79] | One retailer, multiple suppliers | Joint decision-making, security risk compensation, information sharing, free-riding |
69 | Libicki [88] | Multiple players | Cyber deterrence and cyber war |
70 | Liu, Zhang, Zhu, Tan and Yin [60] | One defender, one attacker | Threat propagation between nodes in cyber–physical systems with incomplete information |
71 | Maqbool, Aggarwal, Pammi and Dutt [125] | Multiple defenders, multiple hackers | Laboratory experimental game involving cyber attacks |
72 | Miao and Li [107] | Multiple defenders, multiple attackers | Susceptible–infected–removed epidemic mean-field stochastic cyber security analysis |
73 | Miao, Zhu, Pajic and Pappas [108] | One defender, one attacker | Zero-sum stochastic finite horizon analysis of cyber–physical system |
74 | Miao, Wang, Li, Xu and Zhou [109] | Multiple defenders, multiple attackers | Mean-field cyber security analysis with discrete-time dynamics |
75 | Nagurney, Nagurney and Shukla [76] | Retailers and consumers | Increased supply chain interdependence can increase vulnerabilities to attack |
76 | Nagurney and Shukla [77] | Multiple firms | Information sharing causes financial and security benefits |
77 | Nicho [126] | Multiple players | Education game to build cyber security awareness |
78 | Nicholas and Alderson [35] | One defender, one attacker | Operating a wireless network attacked with jamming |
79 | Nikoofal and Zhuang [39] | One defender, one attacker | Disclosure versus secrecy of a defense system |
80 | Njilla, Pissinou and Makki [63] | One provider, one attacker, one user | Breaching a service provider’s database to expose a user’s private information |
81 | Nye [89] | Multiple players | Nuclear lessons for cyber security |
82 | O’Connor, Hasshu, Bielby, Colreavy-Donnelly, Kuhn, Caraffini and Smith [127] | Multiple players | Training game for cyber security |
83 | Orojloo and Azgomi [34] | One defender, one attacker | Intrusion and disruption of a cyber–physical system |
84 | Orojloo and Azgomi [110] | One defender, one attacker | Stochastic intrusion and disruption of a cyber–physical system |
85 | Pala and Zhuang [29] | One defender, one attacker, one group of applicants | Impatient applicants, Markov process |
86 | Pala and Zhuang [10] | Multiple players | Review: Information sharing, considerations of stakeholders including firms, governments, citizens, and adversaries |
87 | Ravishankar, Rao and Kumar [128] | Multiple defenders, multiple attackers | Software cyber warfare testbed game for critical infrastructure |
88 | Rios Insua, Rios and Banks [49] | One defender, one attacker | Adversarial risk analysis |
89 | Rios Insua, Rios and Banks [48] | One defender, one attacker | Adversarial risk analysis, level-k thinking |
90 | Rothschild, McLay and Guikema [50] | One defender, one attacker | Adversarial risk analysis with incomplete information, level-k approach |
91 | Roy, Ellis, Shiva, Dasgupta, Shandilya and Wu [11] | Multiple players | Review: Cyber security |
92 | Sanjab, Saad and Basar [115] | One defender, one attacker | Benign or malicious interdictor targeting unmanned aerial vehicle operator |
93 | Schelling [86] | Multiple players | Strategy of conflict |
94 | Schramm, Alderson, Carlyle and Dimitrov [85] | Two players | Zero-day attacks |
95 | Sedjelmaci, Brahmi, Ansari and Rehmani [116] | Multiple players | Hierarchical vehicular network game to protect against cyber attacks |
96 | Sedjelmaci, Hadji and Ansari [12] | Multiple players | Review: Cyber security defense of intelligent transportation systems |
97 | Shah and Agarwal [129] | Multiple players | Smartphone security awareness card game |
98 | Shan and Zhuang [24] | One defender, one attacker | Retaliation for smuggling may occur in the third period |
99 | Shan and Zhuang [18] | Two defenders, two attackers | Disruption of terrorism supply chain assuming subsidization and proliferation |
100 | Shen and Feng [101] | Multiple players | Stackelberg interaction between interdependent non-malicious cyber–physical systems |
101 | Shukla, An, Chakrabortty and Duel-Hallen [100] | One defender, one attacker | Stackelberg defense of networked control system of nodes |
102 | Simon [134] | Multiple players | Near decomposability of players |
103 | Simon and Omar [78] | Multiple defenders, one attacker | Security investment is suboptimal without coordination |
104 | Singh, Borkotokey, Lahcen and Mohapatra [111] | One defender, one attacker | Stochastic cyber security with incomplete information and bounded rationality |
105 | Song and Zhuang [27] | One defender, one attacker, one group of applicants | N periods, security screening problem with screening errors |
106 | Song and Zhuang [26] | One defender, one attacker, one group of applicants | Two periods, security screening problem with screening errors |
107 | Song and Zhuang [28] | One defender, one attacker, one group of applicants | Parallel-queue security screening problem with incomplete information |
108 | Tosh, Sengupta, Kamhoua and Kwiat [74] | Multiple firms | Information sharing, dynamic cost adaptation, learning heuristic, evolution |
109 | Tseng, Yang, Shih and Shan [130] | Multiple players | Cyber security education board game |
110 | Wang and Bier [44] | One defender, one attacker | Multitarget resource allocation with incomplete information and multi-attribute utility |
111 | Wang and Bier [45] | One defender, one attacker | Stackelberg multitarget resource allocation while quantifying adversary capabilities |
112 | Wang, Welburn and Hausken [83] | Two players | Zero-day attacks with stockpiling |
113 | Wang and Zhuang [25] | One defender, one attacker, one group of applicants | Congestion, security, incomplete information |
114 | Welburn, Grana and Schwindt [96] | One attacker, one victim | Victim has private information and is uncertain about attributing an attack to an attacker |
115 | Wu, Dong and Wang [117] | One defender, one attacker | Air traffic management of cyber–physical system with incomplete information |
116 | Xing, Zhao, Basar and Xia [112] | Multiple sensors | Resource-constrained security investment in cyber–physical network with asymmetric information |
117 | Xu, Wu and Tao [36] | One defender, one attacker | Mobile communication subject to jamming and eavesdropping |
118 | Xu and Zhuang [15] | One defender, one attacker | Costly learning and counter-learning with private defender information |
119 | Xu and Baykal-Gursoy [37] | One defender, one attacker | Wireless communication subject to jamming and eavesdropping |
120 | Xu and Zhuang [15] | One defender, multiple attackers | Defender moves first, attackers move sequentially thereafter |
121 | Yamin, Katt and Nowostawski [131] | Multiple players | Training game to learn about cyber security |
122 | Yang, Xiang, Liao and Yang [118] | One defender, one attacker | Coupled vehicular transportation network and cyber–physical power system |
123 | Yasin, Liu, Li, Wang and Zowghi [132] | Multiple players | Education game to learn about cyber security |
124 | Yolmeh and Baykal-Gürsoy [55] | One defender, one attacker | Unknown distribution of information about target values and detection probabilities |
125 | Zeijlemaker, Rouwette, Cunico, Armenia and von Kutzschenbach [133] | Multiple players | Cyber security board game to train bank managers |
126 | Zhai, Peng and Zhuang [46] | One defender, one attacker | Defender’s utility is survivability, attacker’s utility is expected number of destroyed elements |
127 | Zhang and Liu [113] | One defender, one attacker | Stochastic analysis of cyber security, bounded rationality, learning |
128 | Zhang and Malacaria [99] | One defender, one attacker | Mixed-integer cyber security controls against multi-stage attacks |
129 | Zhu and Basar [97] | One defender, one attacker | Robustness, security, and resilience of cyber–physical control systems |
130 | Zhuang [17] | Multiple players | Security investment among interdependent agents receiving subsidies |
131 | Zhuang and Bier [58] | One defender, one attacker | Balancing terrorism and natural disasters |
132 | Zhuang and Bier [41] | Multiple players | Reasons for secrecy and deception in resource allocation |
133 | Zhuang and Bier [40] | One defender, one attacker | Truthful disclosure, secrecy, or deception in anti-terrorism |
134 | Zhuang, Bier and Alagoz [42] | Multiple defenders | Interdependent security with time discounting |
135 | Zhuang, Bier and Gupta [16] | Multiple defenders | Interdependent security with time discounting |
References
- Amin, S.; Johansson, K.H. Preface to the Focused Issue on Dynamic Games in Cyber Security. Dyn. Games Appl. 2019, 9, 881–883. [Google Scholar] [CrossRef]
- Do, C.T.; Tran, N.H.; Hong, C.; Kamhoua, C.A.; Kwiat, K.A.; Blasch, E.; Ren, S.; Pissinou, N.; Iyengar, S.S. Game theory for cyber security and privacy. ACM Comput. Surv. (CSUR) 2017, 50, 30. [Google Scholar] [CrossRef]
- Etesami, S.R.; Basar, T. Dynamic Games in Cyber-Physical Security: An Overview. Dyn. Games Appl. 2019, 9, 884–913. [Google Scholar] [CrossRef]
- Guikema, S.; Aven, T. Assessing Risk from Intelligent Attacks: A Perspective on Approaches. Reliab. Eng. Syst. Saf. 2010, 95, 478–483. [Google Scholar] [CrossRef]
- Hausken, K. Cyber resilience in firms, organizations and societies. Internet Things 2020, 11, 100204. [Google Scholar] [CrossRef]
- Hausken, K. Fifty Years of Operations Research in Defense. Eur. J. Oper. Res. 2024, 318, 355–368. [Google Scholar] [CrossRef]
- Hausken, K.; Levitin, G. Review of Systems Defense and Attack Models. Int. J. Perform. Eng. 2012, 8, 355–366. [Google Scholar] [CrossRef]
- Hunt, K.; Zhuang, J. A review of attacker-defender games: Current state and paths forward. Eur. J. Oper. Res. 2024, 313, 401–417. [Google Scholar] [CrossRef]
- Kott, A.; Swami, A.; McDaniel, P. Security Outlook: Six Cyber Game Changers for the Next 15 Years. Computer 2014, 47, 104–106. [Google Scholar] [CrossRef]
- Pala, A.; Zhuang, J. Information Sharing in Cybersecurity: A Review. Decis. Anal. 2019, 16, 172–196. [Google Scholar] [CrossRef]
- Roy, S.; Ellis, C.; Shiva, S.; Dasgupta, D.; Shandilya, V.; Wu, Q. A survey of game theory as applied to network security. In Proceedings of the System Sciences (HICSS), 2010 43rd Hawaii International Conference, Honolulu, HI, USA, 5–8 January 2010; pp. 1–10. [Google Scholar]
- Sedjelmaci, H.; Hadji, M.; Ansari, N. Cyber Security Game for Intelligent Transportation Systems. IEEE Netw. 2019, 33, 216–222. [Google Scholar] [CrossRef]
- Hausken, K. Probabilistic Risk Analysis and Game Theory. Risk Anal. 2002, 22, 17–27. [Google Scholar] [CrossRef] [PubMed]
- Ackerman, G.; Zhuang, J.; Weerasuriya, S. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat. Risk Anal. 2017, 37, 342–371. [Google Scholar] [CrossRef] [PubMed]
- Xu, Z.; Zhuang, J. A Study on A Sequential One-Defender-N-Attacker Game. Risk Anal. 2019, 39, 1414–1432. [Google Scholar] [CrossRef] [PubMed]
- Zhuang, J.; Bier, V.M.; Gupta, A. Subsidies in Interdependent Security with Heterogeneous Discount Rates. Eng. Econ. 2007, 52, 1–19. [Google Scholar] [CrossRef]
- Zhuang, J. Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors. Eng. Econ. 2010, 55, 131–149. [Google Scholar] [CrossRef]
- Shan, X.; Zhuang, J. Subsidizing to Disrupt a Terrorism Supply Chain—A Four-Player Game. J. Oper. Res. Soc. 2014, 65, 1108–1119. [Google Scholar] [CrossRef]
- Hausken, K.; Zhuang, J. Governments’ and Terrorists’ Defense and Attack in a T-Period Game. Decis. Anal. 2011, 8, 46–70. [Google Scholar] [CrossRef]
- Jose, V.R.R.; Zhuang, J. Technology Adoption, Accumulation, and Competition in Multi-period Attacker-Defender Games. Mil. Oper. Res. 2013, 18, 33–47. [Google Scholar] [CrossRef]
- Hausken, K.; Zhuang, J. Defending against a Terrorist Who Accumulates Resources. Mil. Oper. Res. 2011, 16, 21–39. [Google Scholar] [CrossRef]
- Hausken, K.; Zhuang, J. Defending against a Stockpiling Terrorist. Eng. Econ. 2011, 56, 321–353. [Google Scholar]
- Hausken, K.; Zhuang, J. The Timing and Deterrence of Terrorist Attacks due to Exogenous Dynamics. J. Oper. Res. Soc. 2012, 63, 726–735. [Google Scholar] [CrossRef]
- Shan, X.; Zhuang, J. Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection-A Three-Stage Game. Decis. Anal. 2014, 11, 43–62. [Google Scholar] [CrossRef]
- Wang, X.; Zhuang, J. Balancing Congestion and Security in the Presence of Strategic Applicants with Private Information. Eur. J. Oper. Res. 2011, 212, 100–111. [Google Scholar] [CrossRef]
- Song, C.; Zhuang, J. Two-Stage Security Screening Strategies in the Face of Strategic Applicants, Congestions and Screening Errors. Ann. Oper. Res. 2017, 258, 237262. [Google Scholar] [CrossRef]
- Song, C.; Zhuang, J. N-Stage Security Screening Strategies in the Face of Strategic Applicants. Reliab. Eng. Syst. Saf. 2017, 165, 292–301. [Google Scholar] [CrossRef]
- Song, C.; Zhuang, J. Modelling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors. Risk Anal. 2018, 38, 118–133. [Google Scholar] [CrossRef]
- Pala, A.; Zhuang, J. Security Screening Queues with Impatient Applicants: A New Model with a Case Study. Eur. J. Oper. Res. 2018, 265, 919–930. [Google Scholar] [CrossRef]
- Haphuriwat, N.; Bier, V.M.; Willis, H.H. Deterring the Smuggling of Nuclear Weapons in Container Freight through Detection and Retaliation. Decis. Anal. 2011, 8, 88–102. [Google Scholar] [CrossRef]
- Brown, G.G.; Carlyle, W.M.; Harney, R.C.; Skroch, E.M.; Wood, R.K. Interdicting a Nuclear-Weapons Project. Oper. Res. 2009, 57, 866–877. [Google Scholar] [CrossRef]
- Gerald, G.B.; Matthew, C.; Ahmad, A.-G.; Jeffrey, K. A defender-attacker optimization of Port Radar surveillance: Defender-Attacker Optimization of Port Surveillance. Nav. Res. Logist. 2011, 58, 223–235. [Google Scholar] [CrossRef]
- Brown, G.; Kline, J.; Thomas, A.; Washburn, A.; Wood, R.K. A Game-Theoretic Model for Defense of an Oceanic Bastion against Submarines. Mil. Oper. Res. 2011, 16, 25–40. [Google Scholar] [CrossRef]
- Orojloo, H.; Azgomi, M.A. A game-theoretic approach to model and quantify the security of cyber-physical systems. Comput. Ind. 2017, 88, 44–57. [Google Scholar] [CrossRef]
- Nicholas, P.J.; Alderson, D.L. Fast Design of Wireless Mesh Networks to Defend against Worst-Case Jamming. Mil. Oper. Res. 2018, 23, 5–20. [Google Scholar]
- Xu, J.; Wu, H.C.; Tao, X.F. 5G Cyberspace Security Game. J. Electron. Inf. Technol. 2020, 42, 2319–2329. [Google Scholar] [CrossRef]
- Xu, Z.; Baykal-Gursoy, M. Power Allocation for Cooperative Jamming against a Strategic Eavesdropper Over Parallel Channels. IEEE Trans. Inf. Forensic Secur. 2023, 18, 846–858. [Google Scholar] [CrossRef]
- Garnaev, A.; Baykal-Gursoy, M.; Poor, H.V. A Game Theoretic Analysis of Secret and Reliable Communication with Active and Passive Adversarial Modes. IEEE Trans. Wirel. Commun. 2016, 15, 2155–2163. [Google Scholar] [CrossRef]
- Nikoofal, M.E.; Zhuang, J. On the Value of Exposure and Secrecy of Defense System: First-Mover Advantage Vs. Robustness. Eur. J. Oper. Res. 2015, 246, 320–330. [Google Scholar] [CrossRef]
- Zhuang, J.; Bier, V.M. Secrecy and Deception at Equilibrium, with Applications to Anti-Terrorism Resource Allocation. Def. Peace Econ. 2011, 22, 43–61. [Google Scholar] [CrossRef]
- Zhuang, J.; Bier, V.M. Reasons for Secrecy and Deception in Homeland-Security Resource Allocation. Risk Anal. 2010, 30, 1737–1743. [Google Scholar] [CrossRef]
- Zhuang, J.; Bier, V.M.; Alagoz, O. Modeling Secrecy and Deception in a Multiple-Period Attacker-Defender Signaling Game. Eur. J. Oper. Res. 2010, 203, 409–418. [Google Scholar] [CrossRef]
- Dighe, N.S.; Zhuang, J.; Bier, V.M. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effective Attacker Deterrence. Int. J. Perform. Eng. 2009, 5, 31–43. [Google Scholar]
- Wang, C.; Bier, V.M. Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility. Decis. Anal. 2011, 8, 286–302. [Google Scholar] [CrossRef]
- Wang, C.; Bier, V.M. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation. Risk Anal. 2016, 36, 756–775. [Google Scholar] [CrossRef]
- Zhai, Q.; Peng, R.; Zhuang, J. Defender-Attacker Games with Asymmetric Player Utilities. Risk Anal. 2020, 40, 408–420. [Google Scholar] [CrossRef] [PubMed]
- Dong, Y.; Chen, X.; Hunt, K.; Zhuang, J. Defensive Resource Allocation: The Roles of Forecast Information and Risk Control. Risk Anal. 2021, 41, 1304–1322. [Google Scholar] [CrossRef]
- Rios Insua, D.; Rios, J.; Banks, D. Modeling Opponents in Adversarial Risk Analysis. Risk Anal. 2016, 36, 742–755. [Google Scholar] [CrossRef]
- Rios Insua, D.; Rios, J.; Banks, D. Adversarial Risk Analysis. J. Am. Stat. Assoc. 2009, 104, 841–854. [Google Scholar] [CrossRef]
- Rothschild, C.; McLay, L.; Guikema, S. Adversarial Risk Analysis with Incomplete Information: A Level-k Approach. Risk Anal. 2012, 32, 1219–1231. [Google Scholar] [CrossRef] [PubMed]
- Banks, D.; Gallego, V.; Naveiro, R.; Ríos Insua, D. Adversarial risk analysis: An overview. Wiley Interdiscip. Rev. Comput. Stat. 2022, 14, e1530. [Google Scholar] [CrossRef]
- Bier, V.M. Choosing What to Protect. Risk Anal. 2007, 27, 607–620. [Google Scholar] [CrossRef]
- Bier, V.M.; Oliveros, S.; Samuelson, L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econ. Theory 2007, 9, 563–587. [Google Scholar] [CrossRef]
- Hausken, K. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain. Oper. Res. Decis. 2014, 24, 23–44. [Google Scholar]
- Yolmeh, A.; Baykal-Gürsoy, M. A robust approach to infrastructure security games. Comput. Ind. Eng. 2017, 110, 515–526. [Google Scholar] [CrossRef]
- He, F.; Zhuang, J. Modelling ‘Contracts’ between a Terrorist Group and a Government in a Sequential Game. J. Oper. Res. Soc. 2012, 63, 790–809. [Google Scholar] [CrossRef]
- Xu, J.; Zhuang, J. Modeling Costly Learning and Counter-learning in a Defender-attacker Game with Private Defender Information. Ann. Oper. Res. 2016, 236, 271–289. [Google Scholar] [CrossRef]
- Zhuang, J.; Bier, V.M. Balancing Terrorism and Natural Disasters: Defensive Strategy with Endogenous Attacker Effort. Oper. Res. 2007, 55, 976–991. [Google Scholar] [CrossRef]
- Hunt, K.; Agarwal, P.; Zhuang, J. Technology Adoption for Airport Security: Modeling Public Disclosure and Secrecy in an Attacker-defender Game. Reliab. Eng. Syst. Saf. 2021, 207, 107355. [Google Scholar] [CrossRef]
- Liu, X.X.; Zhang, J.X.; Zhu, P.D.; Tan, Q.P.; Yin, W. Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput. Secur. 2021, 102, 102138. [Google Scholar] [CrossRef]
- Gupta, A.; Langbort, C.; Basar, T. Dynamic Games with Asymmetric Information and Resource Constrained Players with Applications to Security of Cyberphysical Systems. IEEE Trans. Control Netw. Syst. 2017, 4, 71–81. [Google Scholar] [CrossRef]
- Han, K.; Choi, J.H. Implications of false alarms in dynamic games on cyber-security. Chaos Solitons Fractals 2023, 169, 113322. [Google Scholar] [CrossRef]
- Njilla, L.Y.; Pissinou, N.; Makki, K. Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 2016, 29, 1500–1512. [Google Scholar] [CrossRef]
- Han, K.; Choi, J.H. A Reputation Game on Cyber-Security and Cyber-Risk Calibration. Appl. Math. Optim. 2022, 85, 13. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P.; Lucyshyn, W. Sharing information on computer systems security: An economic analysis. J. Account. Public Policy 2003, 22, 461–485. [Google Scholar] [CrossRef]
- Gal-Or, E.; Ghose, A. The Economic Incentives for Sharing Security Information. Inf. Syst. Res. 2005, 16, 186–208. [Google Scholar] [CrossRef]
- Hausken, K. Information Sharing Among Firms and Cyber Attacks. J. Account. Public Policy 2007, 26, 639–688. [Google Scholar] [CrossRef]
- Hausken, K. A Strategic Analysis of Information Sharing Among Cyber Attackers. J. Inf. Syst. Technol. Manag. 2015, 12, 245–270. [Google Scholar] [CrossRef]
- Hausken, K. Information Sharing Among Cyber Hackers in Successive Attacks. Int. Game Theory Rev. 2017, 19, 33. [Google Scholar] [CrossRef]
- Hausken, K. Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games 2017, 8, 23. [Google Scholar] [CrossRef]
- Hausken, K. Proactivity and Retroactivity of Firms and Information Sharing of Hackers. Int. Game Theory Rev. 2018, 20, 1750027. [Google Scholar] [CrossRef]
- He, M.; Devine, L.; Zhuang, J. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders using a Decision Theoretic Approach. Risk Anal. 2018, 38, 215–225. [Google Scholar] [CrossRef] [PubMed]
- Levitin, G.; Hausken, K.; Taboada, H.A.; Coit, D.W. Data Survivability Vs. Security in Information Systems. Reliab. Eng. Syst. Saf. 2012, 100, 19–27. [Google Scholar] [CrossRef]
- Tosh, D.; Sengupta, S.; Kamhoua, C.A.; Kwiat, K.A. Establishing evolutionary game models for CYBer security information EXchange (CYBEX). J. Comput. Syst. Sci. 2018, 98, 27–52. [Google Scholar] [CrossRef]
- Bandyopadhyay, T.; Jacob, V.; Raghunathan, S. Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 2010, 11, 7–23. [Google Scholar] [CrossRef]
- Nagurney, A.; Nagurney, L.S.; Shukla, S. A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability. In Computation, Cryptography, and Network Security; Daras, N.J., Rassias, M.T., Eds.; Springer International Publishing: Cham, Swizerland, 2015; pp. 381–398. [Google Scholar]
- Nagurney, A.; Shukla, S. Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability. Eur. J. Oper. Res. 2017, 260, 588–600. [Google Scholar] [CrossRef]
- Simon, J.; Omar, A. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. Eur. J. Oper. Res. 2020, 282, 161–171. [Google Scholar] [CrossRef]
- Li, Y.; Xu, L. Cybersecurity investments in a two-echelon supply chain with third-party risk propagation. Int. J. Prod. Res. 2020, 59, 1216–1238. [Google Scholar] [CrossRef]
- Alpcan, T.; Basar, T. An intrusion detection game with limited observations. In Proceedings of the 12th International Symposium on Dynamic Games and Applications, Sophia Antipolis, France, 3–6 July 2006. [Google Scholar]
- Acemoglu, D.; Malekian, A.; Ozdaglar, A. Network security and contagion. J. Econ. Theory 2016, 166, 536–585. [Google Scholar] [CrossRef]
- Kovenock, D.; Roberson, B. The Optimal Defense of Networks of Targets. Econ. Inq. 2018, 56, 2195–2211. [Google Scholar] [CrossRef]
- Wang, G.; Welburn, J.W.; Hausken, K. A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling. Games 2020, 11, 64. [Google Scholar] [CrossRef]
- Hausken, K.; Welburn, J.W. Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. Inf. Syst. Front. 2021, 23, 1609–1620. [Google Scholar] [CrossRef]
- Schramm, H.; Alderson, D.L.; Carlyle, W.M.; Dimitrov, N.B. A Game Theoretic Model of Strategic Conflict in Cyberspace; Naval Postgraduate School: Monterey, CA, USA, 2012. [Google Scholar]
- Schelling, T.C. The Strategy of Conflict; Harvard University Press: Cambridge, MA, USA, 1960. [Google Scholar]
- Dresher, M. Games of Strategy: Theory and Applications; RAND Corporation: Santa Monica, CA, USA, 1961. [Google Scholar]
- Libicki, M.C. Cyberdeterrence and Cyberwar; Rand Corporation: Santa Monica, CA, USA, 2009. [Google Scholar]
- Nye, J.S. Nuclear lessons for cyber security? Strateg. Stud. Q. 2011, 5, 18–38. [Google Scholar]
- Crosston, M.D. World gone cyber MAD: How “Mutually Assured Debilitation” is the best hope for cyber deterrence. Strateg. Stud. Q. 2011, 5, 100–116. [Google Scholar]
- Jensen, E.T. Cyber deterrence. Emory Int’l L. Rev. 2012, 26, 773. [Google Scholar] [CrossRef]
- Clarke, R.A.; Knake, R.K. Cyber War; Tantor Media, Incorporated: Old Saybrook, CT, USA, 2014. [Google Scholar]
- Jasper, S. Deterring malicious behavior in cyberspace. Strateg. Stud. Q. 2015, 9, 60–85. [Google Scholar]
- Edwards, B.; Furnas, A.; Forrest, S.; Axelrod, R. Strategic aspects of cyberattack, attribution, and blame. Proc. Natl. Acad. Sci. USA 2017, 114, 2825–2830. [Google Scholar] [CrossRef]
- Baliga, S.; De Mesquita, E.B.; Wolitzky, A. Deterrence with Imperfect Attribution. Am. Political Sci. Rev. 2020, 114, 1155–1178. [Google Scholar] [CrossRef]
- Welburn, J.; Grana, J.; Schwindt, K. Cyber deterrence with imperfect attribution and unverifiable signaling. Eur. J. Oper. Res. 2023, 306, 1399–1416. [Google Scholar] [CrossRef]
- Zhu, Q.Y.; Basar, T. Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. Mag. 2015, 35, 46–65. [Google Scholar] [CrossRef]
- Backhaus, S.; Bent, R.; Bono, J.; Lee, R.; Tracey, B.; Wolpert, D.; Xie, D.P.; Yildiz, Y. Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems. IEEE Trans. Smart Grid 2013, 4, 2320–2327. [Google Scholar] [CrossRef]
- Zhang, Y.X.; Malacaria, P. Bayesian Stackelberg games for cyber-security decision support. Decis. Support Syst. 2021, 148, 113599. [Google Scholar] [CrossRef]
- Shukla, P.; An, L.; Chakrabortty, A.; Duel-Hallen, A. A Robust Stackelberg Game for Cyber-Security Investment in Networked Control Systems. IEEE Trans. Control Syst. Technol. 2023, 31, 856–871. [Google Scholar] [CrossRef]
- Shen, J.J.; Feng, D.Q. Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems. Secur. Commun. Netw. 2017, 2017, 9017039. [Google Scholar] [CrossRef]
- Gao, B.Y.; Shi, L.B. Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System. IEEE Access 2020, 8, 30322–30331. [Google Scholar] [CrossRef]
- Li, B.D.; Chen, Y.; Huang, S.W.; Yao, R.; Xia, Y.; Mei, S.W. Graphical Evolutionary Game Model of Virus-Based Intrusion to Power System for Long-Term Cyber-Security Risk Evaluation. IEEE Access 2019, 7, 178605–178617. [Google Scholar] [CrossRef]
- Hu, H.; Liu, Y.L.; Chen, C.; Zhang, H.Q.; Liu, Y. Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1683–1700. [Google Scholar] [CrossRef]
- Huang, K.X.; Zhou, C.J.; Qin, Y.Q.; Tu, W.X. A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron. 2020, 67, 2371–2379. [Google Scholar] [CrossRef]
- Kolokoltsov, V.N.; Bensoussan, A. Mean-Field-Game Model for Botnet Defense in Cyber-Security. Appl. Math. Optim. 2016, 74, 669–692. [Google Scholar] [CrossRef]
- Miao, L.; Li, S. Cyber security based on mean field game model of the defender: Attacker strategies. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717737908. [Google Scholar] [CrossRef]
- Miao, F.; Zhu, Q.Y.; Pajic, M.; Pappas, G.J. A hybrid stochastic game for secure control of cyber-physical systems. Automatica 2018, 93, 55–63. [Google Scholar] [CrossRef]
- Miao, L.; Wang, L.N.; Li, S.; Xu, H.T.; Zhou, X.W. Optimal defense strategy based on the mean field game model for cyber security. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719831180. [Google Scholar] [CrossRef]
- Orojloo, N.; Azgomi, M.A. A Stochastic Game Model for Evaluating the Impacts of Security Attacks against Cyber-Physical Systems. J. Netw. Syst. Manag. 2018, 26, 929–965. [Google Scholar] [CrossRef]
- Singh, M.T.; Borkotokey, S.; Lahcen, R.A.M.; Mohapatra, R.N. A generic scheme for cyber security in resource constraint network using incomplete information game. Evol. Intell. 2023, 16, 819–832. [Google Scholar] [CrossRef]
- Xing, W.; Zhao, X.D.; Basar, T.; Xia, W.G. Security Investment in Cyber-Physical Systems: Stochastic Games with Asymmetric Information and Resource-Constrained Players. IEEE Trans. Autom. Control 2022, 67, 5384–5391. [Google Scholar] [CrossRef]
- Zhang, Y.C.; Liu, J. Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning. Secur. Commun. Netw. 2019, 2019, 3038586. [Google Scholar] [CrossRef]
- Huo, Y.; Dong, W.; Qian, J.; Jing, T. Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS). Sensors 2017, 17, 475. [Google Scholar] [CrossRef] [PubMed]
- Sanjab, A.; Saad, W.; Basar, T. A Game of Drones: Cyber-Physical Security of Time-Critical UAV Applications with Cumulative Prospect Theory Perceptions and Valuations. IEEE Trans. Commun. 2020, 68, 6990–7006. [Google Scholar] [CrossRef]
- Sedjelmaci, H.; Brahmi, I.H.; Ansari, N.; Rehmani, M.H. Cyber Security Framework for Vehicular Network Based on a Hierarchical Game. IEEE Trans. Emerg. Top. Comput. 2021, 9, 429–440. [Google Scholar] [CrossRef]
- Wu, Z.J.; Dong, R.C.; Wang, P. Research on Game Theory of Air Traffic Management Cyber Physical System Security. Aerospace 2022, 9, 397. [Google Scholar] [CrossRef]
- Yang, Z.; Xiang, Y.P.; Liao, K.; Yang, J.W. Research on Security Defense of Coupled Transportation and Cyber-Physical Power System Based on the Static Bayesian Game. IEEE Trans. Intell. Transp. Syst. 2023, 24, 3571–3583. [Google Scholar] [CrossRef]
- Cone, B.D.; Irvine, C.E.; Thompson, M.F.; Nguyen, T.D. A video game for cyber security training and awareness. Comput. Secur. 2007, 26, 63–72. [Google Scholar] [CrossRef]
- Frey, S.; Rashid, A.; Anthonysamy, P.; Pinto-Albuquerque, M.; Naqvi, S.A. The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game. IEEE Trans. Softw. Eng. 2019, 45, 521–536. [Google Scholar] [CrossRef]
- Futter, A. War Games redux? Cyberthreats, US-Russian strategic stability, and new challenges for nuclear security and arms control. Eur. Secur. 2016, 25, 163–180. [Google Scholar] [CrossRef]
- Harta, S.; Margheri, A.; Paci, F.; Sassonea, V. Riskio: A Serious Game for Cyber Security Awareness and Education. Comput. Secur. 2020, 95, 101827. [Google Scholar] [CrossRef]
- Jin, Z.W.; Zhang, S.T.; Hu, Y.Y.; Zhang, Y.N.; Sun, C.Y. Security State Estimation for Cyber-Physical Systems against DoS Attacks via Reinforcement Learning and Game Theory. Actuators 2022, 11, 192. [Google Scholar] [CrossRef]
- Kanellopoulos, A.; Vamvoudakis, K.G. Non-equilibrium dynamic games and cyber-physical security: A cognitive hierarchy approach. Syst. Control Lett. 2019, 125, 59–66. [Google Scholar] [CrossRef]
- Maqbool, Z.; Aggarwal, P.; Pammi, V.S.C.; Dutt, V. Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling. Front. Psychol. 2020, 11, 11. [Google Scholar] [CrossRef] [PubMed]
- Nicho, M. Modelling serious games for enhancing end user cyber security awareness. Iadis-Int. J. Comput. Sci. Inf. Syst. 2020, 15, 91–106. [Google Scholar]
- O’Connor, S.; Hasshu, S.; Bielby, J.; Colreavy-Donnelly, S.; Kuhn, S.; Caraffini, F.; Smith, R. SCIPS: A serious game using a guidance mechanic to scaffold effective training for cyber security. Inf. Sci. 2021, 580, 524–540. [Google Scholar] [CrossRef]
- Ravishankar, M.; Rao, D.V.; Kumar, C.R.S. A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure. Def. Sci. J. 2018, 68, 54–63. [Google Scholar] [CrossRef]
- Shah, P.; Agarwal, A. Cyber Suraksha: A card game for smartphone security awareness. Inf. Comput. Secur. 2023, 31, 576–600. [Google Scholar] [CrossRef]
- Tseng, S.S.; Yang, T.Y.; Shih, W.C.; Shan, B.Y. Building a self-evolving iMonsters board game for cyber-security education. Interact. Learn. Environ. 2022, 32, 1300–1318. [Google Scholar] [CrossRef]
- Yamin, M.M.; Katt, B.; Nowostawski, M. Serious games as a tool to model attack and defense scenarios for cyber-security exercises. Comput. Secur. 2021, 110, 102450. [Google Scholar] [CrossRef]
- Yasin, A.; Liu, L.; Li, T.; Wang, J.M.; Zowghi, D. Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Inf. Softw. Technol. 2018, 95, 179–200. [Google Scholar] [CrossRef]
- Zeijlemaker, S.; Rouwette, E.; Cunico, G.; Armenia, S.; von Kutzschenbach, M. Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers. Systems 2022, 10, 49. [Google Scholar] [CrossRef]
- Simon, H.A. The Sciences of the Artificial; MIT Press: Cambridge, MA, USA, 1969. [Google Scholar]
- Hausken, K. Special Versus General Protection and Attack of Parallel and Series Components. Reliab. Eng. Syst. Saf. 2017, 165, 239–256. [Google Scholar] [CrossRef]
Reference | Topic | Focus Points |
---|---|---|
Amin and Johansson [1] | Dynamic games in cyber security | Security and efficiency can conflict. Topics are asymmetric information, evolution of network security, vulnerability assessment, cyber-induced failures, incentives, and design of mechanisms to reduce risks. |
Do, et al. [2] | Cyber security and privacy | Applying game theory to cyber–physical security, communication security, survivability, information sharing, software-defined networks, steganography, denial of service, packet forwarding, and privacy. Advantages and limitations from design to implementation of defense mechanisms. Game models, features, and solutions. |
Etesami and Basar [3] | Dynamic games in cyber–physical security | Classification of dynamic games into zero sum, stochastic, repeated, differential, Stackelberg, Bayesian, and others. The applications are intrusion detection, risk assessment, signaling games, honeypot/deception, cascading games, Stackelberg security, CBG/hypergame, jamming and eavesdropping, mechanism design, security investment, reinforcement learning, and regret-based learning. |
Guikema and Aven [4] | Perspectives on the impact of intelligent attacks on risk | Assessment of the impact of the likelihood of the assumptions of four perspectives of intelligent attacks on risk assessment and management, i.e., game theory, probabilistic risk analysis eliciting probabilities of initiating events from experts, assessing uncertainties beyond probabilities and expected values, and protecting the highest-valued targets while ignoring the attack probabilities. |
Hausken [5] | Cyber resilience in firms, organizations, and societies | Cyber resilience involving infrastructure, management, policy, economics, insurance, and Internet of Things. Threat actors and non-threat actors have resources, competence, technology, tools, preferences, and beliefs and make choices. Actors impacting and impacted by cyber resilience are governments, organizations, companies, individuals, insurance companies, cyber security providers, regulators, and threat actors. |
Hausken [6] | Defense and attack according to system structure, defense strategies, attack strategies, and defense and attack circumstances | Warfare, methodologies, and defense and attack according to system structure (single target, series systems, parallel systems, series–parallel systems, networks, multiple targets, interdependent systems, degraded systems, dynamically changing system structures, other types of systems), defense strategies (protection, redundancy, deterrence, false targets, separation, individual versus overarching defense and attack, special versus general protection and attack, proactive versus reactive defense, defending with negative or positive incentives), attack strategies (single target, multiple targets, consecutive attacks, random attacks), and defense and attack circumstances (combination of intentional and unintentional impacts, incomplete information, information sharing, cyber war and security, variable resources, expendable versus nonexpendable resources, multiple defenders, multiple attackers, multiple defenders and multiple attackers). |
Hausken and Levitin [7] | Defense and attack in reliability systems according to system structure, defense measures, and attack tactics and circumstances | Defense and attack in reliability systems according to system structure (single element, series systems, parallel systems, series–parallel systems, networks, multiple elements, interdependent systems, and other types of systems), defense measures (false targets, separation of system elements, redundancy, protection, multilevel defense, preventive strike), and attack tactics and circumstances (attack against single element, attack against multiple elements, consecutive attacks, random attacks, combination of intentional and unintentional impacts, incomplete information, and variable resources). |
Hunt and Zhuang [8] | Attacker–defender games: current state and paths forward | Attacker–defender games with focus on the sequence of moves, number of players, decision variables, objective functions, and time horizons. Relaxing the common assumptions of perfect rationality, risk neutrality, and complete information induces further challenges, e.g., enforcing new assumptions about modeling uncertainties and potential intractability to account for risk preferences. The majority apply methods obtaining closed-form solutions, while the minority apply algorithmic and heuristic approaches. Part of the literature applies data for numerical analysis and computational experiments. |
Kott, et al. [9] | Six potential cyber game changers | Six potential cyber game changers are that the cyber environment changes in terms of new computing paradigms and new territories for network complexity, new technology trends such as big data analytics and resilient self-adaption, and cybertechnology breakthroughs such as mixed-trust systems and active defenses. |
Pala and Zhuang [10] | Information sharing in cyber security | Review of focus and methodology within cyber security information sharing involving firms, governments, citizens, and adversaries. The focus is on the actors involved, types of information shared, current legal baseline, information-sharing organizations/policies/architectures, benefits of sharing, and concerns/costs/barriers of sharing. Qualitative approaches discuss challenges and barriers to public/private collaboration pertaining to privacy and liability to ensure secure and effective sharing. Quantitative approaches balance cyber security investment and information sharing to ensure effective incentives. |
Roy, et al. [11] | Cyber security network games | Applying game theory to network cyber security. Their classification taxonomy distinguishes cooperative and non-cooperative games. The latter can be static or dynamic. Static games can have complete or incomplete imperfect information. The latter can be Bayesian or non-Bayesian. Dynamic games can have the four combinations of complete/incomplete and perfect/imperfect information. |
Sedjelmaci, et al. [12] | Cyber security games for intelligent transportation systems | Cyber security defense of intelligent transportation systems. Non-cooperative games are divided into interdiction games, mean field games, Stackelberg games, Bayesian games, and zero-sum games. Cooperative Stackelberg games are considered. Cost and security level of these games are assessed as low, medium, or high. |
Article Section | |
---|---|
1 | Introduction |
2 | This Article’s Contribution beyond Earlier Reviews |
3 | Defense and Attack |
3.1 | One Player Defending or Attacking One Component in a System |
3.2 | Multiple Attackers and/or Multiple Defenders |
3.3 | Multiple-period Attacker–Defender Games |
4 | Various Characteristics of Defense and Attack |
4.1 | Security Screening and Inspection |
4.2 | Detecting Invaders |
4.3 | Defense through Jamming and Eavesdropping |
5 | Defender–Attacker Games with Incomplete Information |
5.1 | Overview |
5.2 | Protecting ManyTargets |
5.3 | Secrecy and Deception |
5.4 | Threat Propagation, Denial of Service Attacks, and False Alarms |
5.5 | Trust and Reputation |
6 | Information Sharing and Security Investment in Cyber Security |
7 | Cyber Stockpiling, Deterrence, Resilience, and Stackelberg and Repeated Games |
7.1 | Stockpiling of Cyber Munitions |
7.2 | Cyber Deterrence |
7.3 | Cyber Resilience |
7.4 | Cyber Security Stackelberg Games |
7.5 | Cyber Security Games for Power Systems |
8 | Stochastic Cyber Security Games |
9 | Cyber Security Games on Traffic and Transportation |
10 | Cyber Security Education and Board Games |
11 | Strengths, Weaknesses, Opportunities, and Future Research |
12 | Conclusions |
Reference | Players | Assumptions | Methods | Results |
---|---|---|---|---|
Alpcan and Basar [80] | One defender, one attacker | An intrusion detection system allocates resources for detection and response, limited information, Q-learning | Stochastic network intrusion detection as a finite Markov chain | Analyze the outcomes and evolution of an example game numerically for various game parameters |
Garnaev, Baykal-Gursoy and Poor [38] | One defender, one attacker | A user as a defender chooses optimally whether to transmit, which may lead the adversary to jam or delay the transmission, which may enable the detection of the adversary if it continues to actively jam instead of eavesdropping passively | Stochastic communication subject to jamming and eavesdropping | The adversary may find eavesdropping less efficient if it cannot time-efficiently utilize the compiled information, and incorporating a detection time slot into the transmission may improve the communication reliability and secrecy |
Hu, et al. [104] | One defender, one attacker | Acknowledge today’s presence of firewalls, intrusion detection, and cryptography, but emphasize the need for a strategic focus | Stochastic evolution of cyber security applying the logit quantal response dynamics equation to specify the cognitive differences of real-world players | Determine the defense cost and benefit, exemplified with ransomware studies |
Huang, et al. [105] | One defender, one attacker | Time-based unified payoff quantification | Quantitative vulnerability analysis to build a cross-layer stochastic security game in an industrial cyber–physical system | Presentation of a hardware-in-the-loop simulation testbed case study |
Kolokoltsov and Bensoussan [106] | Multiple defenders (computer owners as customers), one hacker | The computer owners are offered various defense systems, where the infection controlled by the botnet herder propagates as a random process | Mean-field stochastic game analysis of cyber security | The stationary version is solved given that the customers’ execution time is much faster than the infection rate |
Miao and Li [107] | Multiple defenders, multiple attackers | Binary interaction between attackers and defenders and stochastic propagation of infected computers in a network | Susceptible–infected–removal epidemic mean-field stochastic cyber security analysis | Formulation of the consistency stability problem generated by a Hamilton–Jacobi–Bellman equation |
Miao, et al. [108] | One defender, one attacker | A strategy is to combine one controller, one estimator, and one detector among the candidate components at each state | Hybrid zero-sum stochastic finite horizon analysis of cyber–physical system with a value iteration algorithm with an upper bound for the value of the finite horizon game | Scalable and real-time computation of switching strategies to balance the security overhead and control cost |
Miao, et al. [109] | Multiple defenders, multiple attackers | Each defender has discrete-time dynamics and balances the individual cost against the overall network cost | Mean-field cyber security analysis in Hilbert space where infinitely many players cause a Nash equilibrium for the individual cost function | An optimal condition is determined where the equilibrium is the optimal solution to the overall cost function, illustrated with numerical examples |
Orojloo and Azgomi [110] | One defender, one attacker | Distinguishing two phases, i.e., an intrusion process and a disruption process | Stochastic game of a cyber–physical system | Nash equilibria, best response strategies, and mean time to shutdown are determined, illustrated with a boiling water power plant |
Singh, et al. [111] | One defender, one attacker | Bounded rationality that restricts to a stateless stochastic game where a defender learns the attacker’s cyber behavior | Stochastic online cyber security with incomplete information, criticizing state-oriented Markov games where the number of states explodes | The approach compares favorably with other approaches regarding convergence and the simulation time span |
Xing, et al. [112] | Players are multiple sensors deciding whether to invest in security when sending data packets | The security of the sensors is interdependent due to the network-induced risks and shared over a communication network | Stochastic non-zero-sum games with asymmetric information between resource-constrained players in cyber–physical systems | Develop a backward induction algorithm to determine the Nash equilibria |
Zhang and Liu [113] | One defender, one attacker | Bounded rationality to handle the many possible states in networks with many nodes | Stochastic analysis of cyber security where the defender’s decision algorithm applies time-efficient online learning | The strategy is superior to previous evolutionary equilibrium strategies because it does not rely on prior data |
Reference | Game | Assumptions | Methods | Results |
---|---|---|---|---|
Huo, et al. [114] | Vehicular cyber–physical coalition formation game where vehicles are nodes switching between coalitions | The coalition utility depends on the relative velocity, position, and bandwidth availability ratio of vehicles in a cluster | Address the overload and low communication efficiency, introducing a reputation-based incentive and penalty mechanism | Convergence to a Nash-stable partition is possible, preventing selfish nodes from entering clusters |
Sanjab, et al. [115] | One interdictor targeting one unmanned aerial vehicle operator | Interdictor can be benign or malicious | They apply prospect theory and account for subjective valuations and risk perceptions for equilibrium determination | The interdictor chooses the optimal location(s) for targeting, while the operator chooses the optimal path to evade attacks and minimize the mission completion time |
Sedjelmaci, et al. [116] | Hierarchical vehicular network game between two types of collaborating players | An intrusion decision agent is a head player, supported by secondary agents | The secondary agents cooperate to detect, predict, and react to cyber attacks | They ensure low communication overhead and low delay to obtain low false positive and false negative rates compared with alternative approaches |
Sedjelmaci, Hadji and Ansari [12] | Multiple players in intelligent transportation systems | Cyber security Stackelberg game | Evaluation of suitable security levels and costs and survey of defense methods | They identify an attack’s characteristics to enhance the detection efficiency |
Wu, et al. [117] | Non-cooperative incomplete information dynamic Bayesian game between air traffic management and one attacker | The attacker may camouflage its attack type when attacking a cyber–physical system | Air traffic management may detect the attack type with a certain probability | They determine the perfect Bayesian Nash equilibrium and its existence conditions, enabling the defender to decrease the system loss |
Yang, et al. [118] | Bayesian game between an attacker and a defender of a coupled transportation network and a cyber–physical power system | They account for the load shedding loss of load buses | They simulate the travel of electric vehicles potentially impacted by charging station outages | Experiments are conducted to confirm the model’s effectiveness |
Reference | Game | Objectives | Methods | Results |
---|---|---|---|---|
Cone, et al. [119] | Interactive video game | Build security awareness and support organizational security training in an engaging security adventure | The game applies security concepts and is designed to address organizational cyber security requirements and policies | The game is successfully utilized for information assurance education and may facilitate information awareness |
Frey, et al. [120] | Tabletop game | Players can experiment, learn and reflect over security risks and identify decision patterns, including good practices, typical errors, and pitfalls | Players’ decision-making processes are classified as driven by procedure, experience, scenario, or intuition | Managers and security experts generally favor technological solutions, computer scientists prefer personnel training, and security experts are more confident but may make questionable decisions |
Futter [121] | War games | Analysis of cyberthreats, nuclear security, and arms control deemed especially relevant for USA–Russia relations | Analysis of strategic instability, perceived safety, miscalculation, potential unauthorized nuclear use, and possible future nuclear cuts | Assessments are performed of the many nuclear weapons on hair-trigger alert, where vulnerabilities and problems are potentially exploitable by third parties |
Harta, et al. [122] | Tabletop game | Educate and build cyber security awareness, complementing instruction-led or computer-based security training | Players play as attackers or defenders of critical assets in a fictitious organization | Players acquire knowledge, security awareness, and education on cyber security |
Jin, et al. [123] | Zero-sum game | Denial of service analysis in a cyber–physical system with a sensor as a defender and an attacker | Dynamic adjustment of reinforcement learning algorithm | The players’ strategies converge to the Nash equilibrium |
Kanellopoulos and Vamvoudakis [124] | Dynamic security game | Presentation of a learning algorithm to train the different intelligence levels for boundedly rational agents with level-k intelligence | Development of an iterative method of optimal responses in a cognitive hierarchy cyber–physical system | Equilibrium stability of the closed-loop system and convergence to the Nash equilibrium when the intelligence level approaches infinity |
Maqbool, et al. [125] | Laboratory experimental game | Determine the monetary consequences of cyber attacks on the decision-making of defenders | Random assignment of participants as multiple hackers or multiple defenders | Penalizing defenders for false alarms or misses is 10 times costlier for the defenders than equal payoffs; participants rely excessively on recency, frequency, and variability |
Nicho [126] | Education game | Build cyber security awareness and decrease user vulnerabilities | Train organizational users | Detect, prevent, eliminate, mitigate, and report social engineering threats generated by advanced persistent threat vectors |
O’Connor, et al. [127] | Training game for cyber security | Applying the conceptual framework for e-learning and training as a pattern for designing a serious game | Using a simulated critical infrastructure protection scenario platform, developed in collaboration with industrial partners | Running different scenarios involving financial forecasting and protecting infrastructure such as electricity generation plants |
Ravishankar, et al. [128] | Software cyber warfare testbed game | Analysis of a game between multiple attackers and multiple defenders of critical infrastructure | Using a probability and belief function to account for strengths, vulnerabilities, and uncertainties of information | Optimal strategies are determined and validated using simulation experiments |
Shah and Agarwal [129] | Card game | Increase smartphone security awareness | Application of constructive learning theory and the Fogg behavior model, evaluated with a between-subjects design | Participants in the intervention group are 2.65 times more likely to adopt the recommended behavior |
Tseng, et al. [130] | Board game | Cyber security education and learning with an attack and defense knowledge self-evolving algorithm and a gaming portfolio mining procedure, tested in a children’s summer camp | An ontology fusion-or-splitting procedure for collected cyber security incidents and a quasi-experiment of pre/post testing and concept map testing | Experiments show that students can better acquire up-to-date cyber security knowledge and learn more effectively than in traditional classrooms |
Yamin, et al. [131] | Training game | Continuous training and self-learning of cyber security skills | Players are attackers or defenders, making real-time cyber security decisions | Cyber security exercise scenarios are developed and simulated |
Yasin, et al. [132] | Education game | Learn about cyber security to motivate and enable learning about security attacks and vulnerabilities | Application of cyber security knowledge and empirical evaluation, literature review | The approach reflects real life in a presentable and understandable way |
Zeijlemaker, et al. [133] | Board game | Development of a game that reflects the real-life environment of bank managers | Design of support tools that capture the complex, dynamic nature of cyber security decisions | Poorly performing decision-makers may be unaware of their poor performance and employ heuristics, causing misguided decisions involving overreaction rather than proactivity |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hausken, K.; Welburn, J.W.; Zhuang, J. A Review of Attacker–Defender Games and Cyber Security. Games 2024, 15, 28. https://doi.org/10.3390/g15040028
Hausken K, Welburn JW, Zhuang J. A Review of Attacker–Defender Games and Cyber Security. Games. 2024; 15(4):28. https://doi.org/10.3390/g15040028
Chicago/Turabian StyleHausken, Kjell, Jonathan W. Welburn, and Jun Zhuang. 2024. "A Review of Attacker–Defender Games and Cyber Security" Games 15, no. 4: 28. https://doi.org/10.3390/g15040028
APA StyleHausken, K., Welburn, J. W., & Zhuang, J. (2024). A Review of Attacker–Defender Games and Cyber Security. Games, 15(4), 28. https://doi.org/10.3390/g15040028