Skip to main content

Types of Games

  • Chapter
  • First Online:
Cyber-Security in Critical Infrastructures

Abstract

This chapter introduces the most important classes of games underlying practical security models. These include Stackelberg games, Nash games, signaling games, and games with distribution-valued payoffs. The latter build upon empirical methods and data science to construct games from data, but also reveals theoretic connections to multi-criteria optimization using lexicographic goal priorities (that classical games cannot deal with, but distribution-valued games can handle). Each game description is accompanied by examples from the security domain to motivate and illustrate the use of the individual model. Each class of game is discussed in relation to the other types, highlighting pros and cons, las well as applications, detailed in later chapters.

Life is not a game. Still, in this life, we choose the games we live to play.

J.R. Rim

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alpcan T, Basar T (2004) A game theoretic analysis of intrusion detection in access control systems. In: Decision and control, 2004. CDC. 43rd IEEE conference on, vol 2. IEEE, pp 1568–1573

    Google Scholar 

  2. Basar T (1983) The gaussian test channel with an intelligent jammer. IEEE Trans Inf Theory 29(1):152–157

    Article  Google Scholar 

  3. Chen J, Zhu Q (2016) Interdependent network formation games with an application to critical infrastructures. In: American control conference (ACC). IEEE, pp 2870–2875. http://ieeexplore.ieee.org/abstract/document/7525354/

  4. Chen J, Touati C, Zhu Q (2019) Optimal secure two-layer iot network design. IEEE Trans Control Netw Syst 1–1. https://doi.org/10.1109/TCNS.2019.2906893

  5. Chen J, Touati C, Zhu Q (2020) A dynamic game approach to strategic design of secure and resilient infrastructure network. IEEE Trans Inf Forensics Secur 15:462–474. https://doi.org/10.1109/TIFS.2019.2924130

    Article  Google Scholar 

  6. Clark A, Zhu Q, Poovendran R, Başar T (2012) Deceptive routing in relay networks. In: Decision and game theory for security. Springer, pp 171–185

    Google Scholar 

  7. Farhang S, Manshaei MH, Esfahani MN, Zhu Q (2014) A dynamic bayesian security game framework for strategic defense mechanism design. In: Decision and game theory for security. Springer, pp 319–328

    Google Scholar 

  8. Farooq MJ, Zhu Q (2018) A multi-layer feedback system approach to resilient connectivity of remotely deployed mobile Internet of things. IEEE Trans Cogn Commun Netw 4(2):422–432

    Article  Google Scholar 

  9. Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17(4):2618–2632

    Article  Google Scholar 

  10. Farooq MJ, Zhu Q (2019) Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans Inf Forensics Secur 14:2412–2426

    Article  Google Scholar 

  11. Farooq MJ, ElSawy H, Zhu Q, Alouini MS (2017) Optimizing mission critical data dissemination in massive IoT networks. In: Modeling and optimization in mobile, Ad Hoc, and wireless networks (WiOpt), 2017 15th international symposium on. IEEE, pp 1–6. http://ieeexplore.ieee.org/abstract/document/7959930/

  12. Fudenberg D, Tirole J (1991) Game theory. MIT Press, Cambridge

    MATH  Google Scholar 

  13. Hayel Y, Zhu Q (2015) Attack-aware cyber insurance for risk sharing in computer networks. In: Decision and game theory for security. Springer, pp 22–34

    Google Scholar 

  14. Hayel Y, Zhu Q (2017) Epidemic protection over heterogeneous networks using evolutionary poisson games. IEEE Trans Inf Forensics Secur 12(8):1786–1800

    Article  Google Scholar 

  15. Hogg RV, Klugman SA (1984) Loss distributions. Wiley series in probability and mathematical statistics applied probability and statistics. Wiley, New York. https://doi.org/10.1002/9780470316634. http://gso.gbv.de/DB=2.1/PPNSET?PPN=599519185

  16. Huang L, Zhu Q (2018) Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems. In: International conference on decision and game theory for security. Springer, pp 205–226

    Google Scholar 

  17. Huang L, Zhu Q (2019) Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks. ACM SIGMETRICS Perform Eval Rev 46(2):52–56

    Article  Google Scholar 

  18. Huang L, Zhu Q (2019) Dynamic Bayesian games for adversarial and defensive cyber deception. In: Al-Shaer E, Wei J, Hamlen KW, Wang C (eds) Autonomous cyber deception: reasoning, adaptive planning, and evaluation of honeyThings. Springer International Publishing, Cham, pp 75–97. https://doi.org/10.1007/978-3-030-02110-8_5

    Chapter  Google Scholar 

  19. Huang Y, Zhu Q (2019) A differential game approach to decentralized virus-resistant weight adaptation policy over complex networks. arXiv preprint arXiv:1905.02237

    Google Scholar 

  20. Huang JW, Zhu Q, Krishnamurthy V, Basar T (2010) Distributed correlated q-learning for dynamic transmission control of sensor networks. In: Acoustics speech and signal processing (ICASSP), 2010 IEEE international conference on. IEEE, pp 1982–1985

    Google Scholar 

  21. Huang L, Chen J, Zhu Q (2017) A large-scale markov game approach to dynamic protection of interdependent infrastructure networks. In: International conference on decision and game theory for security. Springer, pp 357–376

    Google Scholar 

  22. Huang L, Chen J, Zhu Q (2018) Distributed and optimal resilient planning of large-scale interdependent critical infrastructures. In: 2018 winter simulation conference (WSC). IEEE, pp 1096–1107

    Google Scholar 

  23. Huang L, Chen J, Zhu Q (2018) Factored Markov game theory for secure interdependent infrastructure networks. In: Game theory for security and risk management. Springer, pp 99–126

    Google Scholar 

  24. Kim S (2015) Nested game-based computation offloading scheme for Mobile Cloud IoT systems. EURASIP J Wirel Commun Netw 2015(1):229. https://10.1186/s13638-015-0456-5. https://link.springer.com/article/10.1186/s13638-015-0456-5

  25. Kuhn H (1953) Extensive games and the problem of information. In: Kuhn H, Tucker A (eds) Contributions to the theory of games II. Annals of mathematics studies 28, vol. II. Princeton University Press, Princeton, pp 193–216

    Google Scholar 

  26. Miao F, Zhu Q (2014) A moving-horizon hybrid stochastic game for secure control of cyber-physical systems. In: Decision and control (CDC), 2014 IEEE 53rd annual conference on. IEEE, pp 517–522

    Google Scholar 

  27. Nash JF, et al (1950) Equilibrium points in N-person games. Proc Natl Acad Sci 36(1):48–49

    Article  MathSciNet  Google Scholar 

  28. Pawlick J (2018) A systems science perspective on deception for cybersecurity in the Internet of things. Ph.D. thesis, NY University . http://proxy.library.nyu.edu/login?url=https://search.proquest.com/docview/2051798175?accountid=12768. Copyright – database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works; Last updated – 2018-08-09

  29. Pawlick J, Zhu Q (2015) Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458

    Google Scholar 

  30. Pawlick J, Zhu Q (2016) A Stackelberg game perspective on the conflict between machine learning and data obfuscation. In: Information forensics and security (WIFS), 2016 IEEE international workshop on. IEEE, pp 1–6. http://ieeexplore.ieee.org/abstract/document/7823893/

  31. Pawlick J, Zhu Q (2017) A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization. In: 2017 IEEE global conference on signal and information processing (GlobalSIP). IEEE, pp 518–522

    Google Scholar 

  32. Pawlick J, Zhu Q (2017) Proactive defense against physical denial of service attacks using poisson signaling games. In: International conference on decision and game theory for security. Springer, pp 336–356

    Google Scholar 

  33. Pawlick J, Farhang S, Zhu Q (2015) Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Decision and game theory for security. Springer, pp 289–308

    Google Scholar 

  34. Pawlick J, Colbert E, Zhu Q (2017) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. arXiv preprint arXiv:1712.05441

    Google Scholar 

  35. Pawlick J, Chen J, Zhu Q (2018) ISTRICT: an interdependent strategic trust mechanism for the cloud-enabled Internet of controlled things. IEEE Trans Inf Forensics Secur 14:1654–1669

    Article  Google Scholar 

  36. Pawlick J, Colbert E, Zhu Q (2018) Modeling and analysis of leaky deception using signaling games with evidence. IEEE Trans Inf Forensics Secur 14(7):1871–1886

    Article  Google Scholar 

  37. Pawlick J, Colbert E, Zhu Q (2019) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput Surv (CSUR) 52(4):82

    Article  Google Scholar 

  38. Rass S (2015) On game-theoretic risk management (part one)-towards a theory of games with payoffs that are probability-distributions. arXiv:1506.07368v4 [q-fin.EC]

    Google Scholar 

  39. Rass S (2015) On game-theoretic risk management (part two) – algorithms to compute Nash-equilibria in games with distributions as payoffs. arXiv:1511.08591v1 [q-fin.EC]

    Google Scholar 

  40. Rass S (2017) On game-theoretic risk management (part three) – modeling and applications. arXiv:1711.00708v1 [q-fin.EC]

    Google Scholar 

  41. Rass S, Zhu Q (2016) Gadapt: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: International conference on decision and game theory for security. Springer International Publishing, pp 314–326. http://link.springer.com/chapter/10.1007/978-3-319-47413-7_18

    MATH  Google Scholar 

  42. Rass S, König S, Schauer S (2015) Uncertainty in games: using probability distributions as payoffs. In: Khouzani MH, Panaousis E, Theodorakopoulos G (eds) GameSec 2015: decision and game theory for security, LNCS 9406. Springer, pp 346–357

    Google Scholar 

  43. Rass S, König S, Schauer S (2016) Decisions with uncertain consequences – a total ordering on loss-distributions. PLoS One 11(12):e0168583. https://doi.org/10.1371/journal.pone.0168583

    Article  Google Scholar 

  44. Rass S, Konig S, Schauer S (2017) Defending against advanced persistent threats using game-theory. PLoS One 12(1):e0168675. https://doi.org/10.1371/journal.pone.0168675

    Article  Google Scholar 

  45. Rass S, König S, Panaousis E (2019) Cut-the-rope: a game of stealthy intrusion. In: Alpcan T, Vorobeychik Y, Baras JS, Dán G (eds) Decision and game theory for security. Springer International Publishing, Cham, pp 404–416

    Chapter  Google Scholar 

  46. Rass S, König S, Alshawish A (2020) HyRiM: multicriteria risk management using zero-sum games with vector-valued payoffs that are probability distributions. https://cran.r-project.org/package=HyRiM. Version 1.0.5

  47. Van Dijk M, Juels A, Oprea A, Rivest RL (2013) Flipit: the game of “stealthy takeover”. J Cryptol 26(4):655–713

    Article  MathSciNet  Google Scholar 

  48. Von Stackelberg H (1934) Marktform und gleichgewicht. J. springer, Wien

    Google Scholar 

  49. Xu Z, Zhu Q (2015) A cyber-physical game framework for secure and resilient multi-agent autonomous systems. In: Decision and control (CDC), 2015 IEEE 54th annual conference on. IEEE, pp 5156–5161

    Google Scholar 

  50. Xu Z, Zhu Q (2017) A game-theoretic approach to secure control of communication-based train control systems under jamming attacks. In: Proceedings of the 1st international workshop on safe control of connected and autonomous vehicles. ACM, pp 27–34. http://dl.acm.org/citation.cfm?id=3055381

  51. Zhang R, Zhu Q (2015) Secure and resilient distributed machine learning under adversarial environments. In: 2015 18th international conference on information fusion (fusion). IEEE, pp 644–651

    Google Scholar 

  52. Zhang R, Zhu Q (2016) Attack-aware cyber insurance of interdependent computer networks. SSRN Electron J. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2848576

  53. Zhang R, Zhu Q (2017) A game-theoretic analysis of label flipping attacks on distributed support vector machines. In: Information sciences and systems (CISS), 2017 51st annual conference on. IEEE, pp 1–6. http://ieeexplore.ieee.org/abstract/document/7926118/

  54. Zhang T, Zhu Q (2017) Dynamic differential privacy for ADMM-based distributed classification learning. IEEE Trans Inf Forensics Secur 12(1):172–187. http://ieeexplore.ieee.org/abstract/document/7563366/

    Article  MathSciNet  Google Scholar 

  55. Zhang T, Zhu Q (2017) Strategic defense against deceptive civilian GPS spoofing of unmanned aerial vehicles. In: International conference on decision and game theory for security. Springer, pp 213–233

    Google Scholar 

  56. Zhang R, Zhu Q (2018) A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans Neural Netw Learn Syst 29(11):5512–5527

    Article  MathSciNet  Google Scholar 

  57. Zhang R, Zhu Q, Hayel Y (2017) A bi-level game approach to attack-aware cyber insurance of computer networks. IEEE J Sel Areas Commun 35(3):779–794. http://ieeexplore.ieee.org/abstract/document/7859343/

    Article  Google Scholar 

  58. Zhang T, Huang L, Pawlick J, Zhu Q (2019) Game-theoretic analysis of cyber deception: evidence-based strategies and dynamic risk mitigation. arXiv preprint arXiv:1902.03925

    Google Scholar 

  59. Zhu Q, Başar T (2009) Dynamic policy-based IDS configuration. In: Decision and control, 2009 held jointly with the 2009 28th Chinese control conference. CDC/CCC 2009. Proceedings of the 48th IEEE conference on. IEEE, pp 8600–8605

    Google Scholar 

  60. Zhu Q, Başar T (2011) Indices of power in optimal IDS default configuration: theory and examples. In: Decision and game theory for security. Springer, pp 7–21

    Google Scholar 

  61. Zhu Q, Başar T (2012) A dynamic game-theoretic approach to resilient control system design for cascading failures. In: Proceedings of the 1st international conference on high confidence networked systems. ACM, pp 41–46

    Google Scholar 

  62. Zhu Q, Başar T (2013) Game-theoretic approach to feedback-driven multi-stage moving target defense. In: International conference on decision and game theory for security. Springer, pp 246–263

    Google Scholar 

  63. Zhu Q, Basar T (2015) Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. Control Syst IEEE 35(1):46–65

    Article  MathSciNet  Google Scholar 

  64. Zhu Q, Han Z, Başar T (2010) No-regret learning in collaborative spectrum sensing with malicious nodes. In: Communications (ICC), 2010 IEEE international conference on. IEEE, pp 1–6

    Google Scholar 

  65. Zhu Q, Li H, Han Z, Basar T (2010) A stochastic game model for jamming in multi-channel cognitive radio systems. In: 2010 IEEE international conference on communications. IEEE, pp 1–6

    Google Scholar 

  66. Zhu Q, Tembine H, Başar T (2010) Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Decision and control (CDC), 2010 49th IEEE conference on. IEEE, pp 219–224

    Google Scholar 

  67. Zhu Q, Tembine H, Basar T (2010) Network security configurations: a nonzero-sum stochastic game approach. In: American control conference (ACC), 2010. IEEE, pp 1059–1064

    Google Scholar 

  68. Zhu Q, Tembine H, Basar T (2011) Distributed strategic learning with application to network security. In: American control conference (ACC), 2011. IEEE, pp 4057–4062

    Google Scholar 

  69. Zhu Q, Saad W, Han Z, Poor HV, Başar T (2011) Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: 2011-MILCOM 2011 military communications conference. IEEE, pp 119–124

    Google Scholar 

  70. Zhu Q, Song JB, Başar T (2011) Dynamic secure routing game in distributed cognitive radio networks. In: Global telecommunications conference (GLOBECOM 2011), 2011 IEEE. IEEE, pp 1–6

    Google Scholar 

  71. Zhu Q, Yuan Z, Song JB, Han Z, Başar T (2012) Interference aware routing game for cognitive radio multi-hop networks. Sel Areas Commun IEEE J 30(10):2006–2015

    Article  Google Scholar 

  72. Zhu Q, Rass S, Schartner P (2018) Community-based security for the Internet of things. arXiv preprint arXiv:1810.00281

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rass, S., Schauer, S., König, S., Zhu, Q. (2020). Types of Games. In: Cyber-Security in Critical Infrastructures. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-46908-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-46908-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-46907-8

  • Online ISBN: 978-3-030-46908-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics