Decision and Game Theory for Security

First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

  • Tansu Alpcan
  • Levente Buttyán
  • John S. Baras
Conference proceedings GameSec 2010

DOI: 10.1007/978-3-642-17197-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6442)

Table of contents (18 papers)

  1. Front Matter
  2. Security Investments and Planning

    1. Design of Network Topology in an Adversarial Environment
      Assane Gueye, Jean C. Walrand, Venkat Anantharam
      Pages 1-20
    2. Optimal Information Security Investment with Penetration Testing
      Rainer Böhme, Márk Félegyházi
      Pages 21-37
  3. Privacy and Anonymity

    1. Tracking Games in Mobile Networks
      Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger, Jean-Pierre Hubaux
      Pages 38-57
    2. gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
      Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das
      Pages 58-71
    3. When Do Firms Invest in Privacy-Preserving Technologies?
      Murat Kantarcioglu, Alain Bensoussan, SingRu(Celine) Hoe
      Pages 72-86
  4. Adversarial and Robust Control

    1. Adversarial Control in a Delay Tolerant Network
      Eitan Altman, Tamer Başar, Veeraruna Kavitha
      Pages 87-106
    2. Security Interdependencies for Networked Control Systems with Identical Agents
      Saurabh Amin, Galina A. Schwartz, S. Shankar Sastry
      Pages 107-122
    3. Robust Control in Sparse Mobile Ad-Hoc Networks
      Eitan Altman, Alireza Aram, Tamer Başar, Corinne Touati, Saswati Sarkar
      Pages 123-134
  5. Network Security and Botnets

    1. A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
      Alain Bensoussan, Murat Kantarcioglu, SingRu(Celine) Hoe
      Pages 135-148
    2. ISPs and Ad Networks Against Botnet Ad Fraud
      Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux
      Pages 149-167
    3. A Localization Game in Wireless Sensor Networks
      Nicola Gatti, Mattia Monga, Sabrina Sicari
      Pages 168-179
    4. Effective Multimodel Anomaly Detection Using Cooperative Negotiation
      Alberto Volpatto, Federico Maggi, Stefano Zanero
      Pages 180-191
  6. Authorization and Authentication

    1. The Password Game: Negative Externalities from Weak Password Practices
      Sören Preibusch, Joseph Bonneau
      Pages 192-207
    2. Towards a Game Theoretic Authorisation Model
      Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson
      Pages 208-219
  7. Theory and Algorithms for Security

    1. Disperse or Unite? A Mathematical Model of Coordinated Attack
      Steve Alpern, Robbert Fokkink, Joram op den Kelder, Tom Lidbetter
      Pages 220-233
    2. Uncertainty in Interdependent Security Games
      Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang
      Pages 234-244
    3. Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
      Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer
      Pages 245-256
    4. Methods and Algorithms for Infinite Bayesian Stackelberg Security Games
      Christopher Kiekintveld, Janusz Marecki, Milind Tambe
      Pages 257-265
  8. Back Matter

About these proceedings


Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” contains four articles on various th- retic and algorithmic aspects of security.


algorithms approximate algorithms game theory information security networked control systems optimization security

Editors and affiliations

  • Tansu Alpcan
    • 1
  • Levente Buttyán
    • 2
  • John S. Baras
    • 3
  1. 1.Deutsche Telekom LaboratoriesTechnische Universität BerlinBerlinGermany
  2. 2.Laboratory of Cryptography and System Security (CrySyS)Budapest University of Technology and EconomicsBudapestHungary
  3. 3.Department of Electrical and Computer EngineeringUniversity of MarylandCollege ParkUSA

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17196-3
  • Online ISBN 978-3-642-17197-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349