A Game Theoretic Investigation of Deception in Network Security.
Thomas E. CarrollDaniel GrosuPublished in: ICCCN (2009)
Keyphrases
- network security
- game theoretic
- game theory
- computer networks
- intrusion detection
- decision problems
- traffic analysis
- intrusion detection system
- network traffic
- anomaly detection
- risk assessment
- information security
- imperfect information
- nash equilibrium
- security breaches
- incomplete information
- situation assessment
- trust model
- solution concepts
- dos attacks
- anti phishing
- network administrators
- packet filtering
- security protection
- network monitoring
- mental states
- agent programming
- semi supervised
- data mining
- nash equilibria
- data fusion
- sufficient conditions
- regret minimization
- data mining techniques
- cooperative
- pure nash equilibria