Journal of Computer Engineering & Information TechnologyISSN : 2324-9307

Reach Us +1 850 754 6199

Research Article, J Comput Eng Inf Technol Vol: 2 Issue: 1

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

Ibidunmoye EO, Alese BK and Ogundele OS*
Department of Computer Science, Federal University of Technology, Akure, Nigeria
Corresponding author : Ogundele OS
Department of Computer Science, Federal University of Technology, Akure, Nigeria
Tel: +2348037752527
E-mail: [email protected]
Received: December 07, 2012 Accepted: March 01, 2013 Published: March 08, 2013
Citation: Ibidunmoye EO, Alese BK, Ogundele OS (2013) A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction. J Comput Eng Inf Technol 2:1. doi:10.4172/2324-9307.1000103

Abstract

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators).

Keywords: Security games; Strategies; Attackers; Defenders; Stochastic games; Game theory

Track Your Manuscript

Share This Page