A Game Theoretic Engine for Cyber Warfare

Part of the Studies in Computational Intelligence book series (SCI, volume 563)


The nature of the cyber warfare environment creates a unique confluence of situational awareness, understanding of correlations between actions, and measurement of progress toward a set of goals. Traditional fusion methods leverage the physical properties of objects and actions about those objects. These physical properties in many cases simply do not apply to cyber network objects. As a result, systematic, attributable measurement and understanding of the cyber warfare environment requires a different approach. We describe the application of a mathematical search engine having inherent design features that include tolerance of missing or incomplete data, virtually connected action paths, highly dynamic tactics and procedures, and broad variations in temporal correlation. The ability efficiently to consider a breadth of possibilities, combined with a chiefly symbolic computation outcome, offers unique capabilities in the cyber domain.


Child Node Intrusion Detection System Time Queue Move Selection Interesting Time 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Katz, A., Butler, B.: “Game Commander”-Applying an architecture of game theory and tree look ahead to the command and control process. In: Proceedings of the Fifth Annual Conference on AI, Simulation, and Planning (AIS94). Florida (1994)Google Scholar
  2. 2.
    Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 211–229 (1959)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Tesauro, G.: TD-Gammon, a Self-Teaching Backgammon Program, reaches master-level play. Neural Comput. 6(2), 215–219 (1994)CrossRefGoogle Scholar
  4. 4.
    Hsu, F., et al.: Deep thought. In: Marsland, T.A., Schaeffer, J. (eds.) Computer, Chess, and Cognition, pp. 55–78. Springer, New York (1990)Google Scholar
  5. 5.
    Hamilton, S.N., Hamilton, W.L.: Adversary modeling and simulation in cyber warfare. International Information Security Conference (2008)Google Scholar
  6. 6.
    Dudebout, N., Shamma, J.S.: Empirical evidence equilibria in stochastic games. In: 51st IEEE Conference on Deicsion and Control, December 2012 (2012)Google Scholar
  7. 7.
    Gopalakrishnan, R., Marden, J.R., Wierman, A.: An architectural view of game theoretic control. ACM SIGMETRICS Perform. Eval. Rev. 38(3), 31–36 (2011)Google Scholar
  8. 8.
    Marden, J.R., Arslan, G., Shamma, J.S.: Connections between cooperative control and potential games. IEEE Trans. Syst. Man Cybern. Part B Cybern. 39, 1393–1407 (2009)Google Scholar
  9. 9.
    Chen, L., Low, S.H., Doyle, J.C.: Random access game and medium access control design. IEEE/ACM Trans. Networking 18(4), 1303–1316 (2010)CrossRefGoogle Scholar
  10. 10.
    Chandra, F., Gayme, D.F., Chen, L., Doyle, J.C.: Robustness, optimization, and architectures. Eur. J. Control 5–6, 472–482 (2011)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Chen, L., Li, N., Jiang, L., Low, S.H.: Optimal demand response: problem formulation and deterministic case. In: Chakrabortty, A., Ilic, M. (eds.) Control and Optimization Theory for Electric Smart Grids. Springer, New York (2012)Google Scholar
  12. 12.
    Carmel, D., Markovitch, S.: Learning and using opponent models in adversary search. Technical report CIS9606 (1996)Google Scholar
  13. 13.
    Meyers, K., Saydjari, O.S., et al.: ARDA cyber strategy and tactics workshop final report (2002)Google Scholar
  14. 14.
    Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The role of game theory in information warfare. The information survivability workshop (2001)Google Scholar
  15. 15.
    Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges in applying game theory to the domain of information warfare. The information survivability workshop (2001)Google Scholar
  16. 16.
    Rickard, J.T., Aisbett, J.: New classes of threshold aggregation functions based upon the Tsallis q-exponential with applications to perceptual computing. Accepted for publication in IEEE Trans. Fuzzy Syst. (2013)Google Scholar
  17. 17.
    Rickard, J.T., Aisbett, J., Yager, R.R., Gibbon, G.: Linguistic weighted power means: comparison with the linguistic weighted average. In: Proceedings of FUZZ-IEEE 2011, 2011 World Congress on Computational Intelligence, June 2011, pp. 2185–2192. Taipei, Taiwan (2011)Google Scholar
  18. 18.
    Rickard, J.T., Aisbett, J., Yager, R.R., Gibbon, G.: Fuzzy weighted power means in evaluation decisions. In: Proceedings of World Symposium on Soft Computing, Paper #100, May 2011. San Francisco, CA (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Distributed Infinity, Inc.LarkspurUSA
  2. 2.Distributed Infinity, Inc.Los AngelesUSA
  3. 3.Distributed Infinity, Inc.LarkspurUSA

Personalised recommendations