Journal of Computer Engineering & Information TechnologyISSN : 2324-9307

Reach Us +1 850 754 6199
All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article, J Comput Eng Inf Technol Vol: 2 Issue: 1

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

Ibidunmoye EO, Alese BK and Ogundele OS*
Department of Computer Science, Federal University of Technology, Akure, Nigeria
Corresponding author : Ogundele OS
Department of Computer Science, Federal University of Technology, Akure, Nigeria
Tel: +2348037752527
E-mail: [email protected]
Received: December 07, 2012 Accepted: March 01, 2013 Published: March 08, 2013
Citation: Ibidunmoye EO, Alese BK, Ogundele OS (2013) A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction. J Comput Eng Inf Technol 2:1. doi:10.4172/2324-9307.1000103

Abstract

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators).

Keywords: Security games; Strategies; Attackers; Defenders; Stochastic games; Game theory

Track Your Manuscript

Share This Page