Skip to main content
  • Conference proceedings
  • © 2010

Decision and Game Theory for Security

First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

  • Fast-track conference proceedings

  • State-of-the-art research

  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6442)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security

Conference proceedings info: GameSec 2010.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (18 papers)

  1. Front Matter

  2. Security Investments and Planning

    1. Design of Network Topology in an Adversarial Environment

      • Assane Gueye, Jean C. Walrand, Venkat Anantharam
      Pages 1-20
    2. Optimal Information Security Investment with Penetration Testing

      • Rainer Böhme, Márk Félegyházi
      Pages 21-37
  3. Privacy and Anonymity

    1. Tracking Games in Mobile Networks

      • Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger, Jean-Pierre Hubaux
      Pages 38-57
    2. gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity

      • Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das
      Pages 58-71
    3. When Do Firms Invest in Privacy-Preserving Technologies?

      • Murat Kantarcioglu, Alain Bensoussan, SingRu(Celine) Hoe
      Pages 72-86
  4. Adversarial and Robust Control

    1. Adversarial Control in a Delay Tolerant Network

      • Eitan Altman, Tamer Başar, Veeraruna Kavitha
      Pages 87-106
    2. Security Interdependencies for Networked Control Systems with Identical Agents

      • Saurabh Amin, Galina A. Schwartz, S. Shankar Sastry
      Pages 107-122
    3. Robust Control in Sparse Mobile Ad-Hoc Networks

      • Eitan Altman, Alireza Aram, Tamer Başar, Corinne Touati, Saswati Sarkar
      Pages 123-134
  5. Network Security and Botnets

    1. A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model

      • Alain Bensoussan, Murat Kantarcioglu, SingRu(Celine) Hoe
      Pages 135-148
    2. ISPs and Ad Networks Against Botnet Ad Fraud

      • Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux
      Pages 149-167
    3. A Localization Game in Wireless Sensor Networks

      • Nicola Gatti, Mattia Monga, Sabrina Sicari
      Pages 168-179
    4. Effective Multimodel Anomaly Detection Using Cooperative Negotiation

      • Alberto Volpatto, Federico Maggi, Stefano Zanero
      Pages 180-191
  6. Authorization and Authentication

    1. The Password Game: Negative Externalities from Weak Password Practices

      • Sören Preibusch, Joseph Bonneau
      Pages 192-207
    2. Towards a Game Theoretic Authorisation Model

      • Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson
      Pages 208-219
  7. Theory and Algorithms for Security

    1. Disperse or Unite? A Mathematical Model of Coordinated Attack

      • Steve Alpern, Robbert Fokkink, Joram op den Kelder, Tom Lidbetter
      Pages 220-233
    2. Uncertainty in Interdependent Security Games

      • Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang
      Pages 234-244
    3. Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent

      • Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer
      Pages 245-256
    4. Methods and Algorithms for Infinite Bayesian Stackelberg Security Games

      • Christopher Kiekintveld, Janusz Marecki, Milind Tambe
      Pages 257-265
  8. Back Matter

Other Volumes

  1. Decision and Game Theory for Security

About this book

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” contains four articles on various th- retic and algorithmic aspects of security.

Keywords

  • algorithms
  • approximate algorithms
  • game theory
  • information security
  • networked control systems
  • optimization
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Deutsche Telekom Laboratories, Technische Universität Berlin, Berlin, Germany

    Tansu Alpcan

  • Laboratory of Cryptography and System Security (CrySyS), Budapest University of Technology and Economics, Budapest, Hungary

    Levente Buttyán

  • Department of Electrical and Computer Engineering, University of Maryland, College Park, USA

    John S. Baras

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions