{"id":"https://openalex.org/W2887801992","doi":"https://doi.org/10.1109/icc.2018.8422719","title":"A Game Theoretic Approach to Model Cyber Attack and Defense Strategies","display_name":"A Game Theoretic Approach to Model Cyber Attack and Defense Strategies","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2887801992","doi":"https://doi.org/10.1109/icc.2018.8422719","mag":"2887801992"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050495099","display_name":"Afraa Attiah","orcid":"https://orcid.org/0000-0002-3351-904X"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"funder","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Afraa Attiah","raw_affiliation_strings":["College of Engineering and Computer Science, King Abdulaziz University, Jeddah, Florida, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Computer Science, King Abdulaziz University, Jeddah, Florida, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101887349","display_name":"Mainak Chatterjee","orcid":"https://orcid.org/0000-0001-5957-7478"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"funder","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mainak Chatterjee","raw_affiliation_strings":["College of Engineering and Computer Science, University of Central Florida, Florida, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Computer Science, University of Central Florida, Florida, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052179538","display_name":"Cliff C. Zou","orcid":"https://orcid.org/0000-0003-4229-6957"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"funder","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cliff C. Zou","raw_affiliation_strings":["College of Engineering and Computer Science, University of Central Florida, Florida, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Computer Science, University of Central Florida, Florida, USA","institution_ids":["https://openalex.org/I106165777"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.257,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":45,"citation_normalized_percentile":{"value":0.999818,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.6302699},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.54637796},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.49449798},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.46827602},{"id":"https://openalex.org/keywords/strategy","display_name":"Strategy","score":0.44278827}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7944996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7593643},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7389549},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.6364469},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6302699},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6253485},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.57240653},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.54637796},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.53512996},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.49449798},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.48999706},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.46827602},{"id":"https://openalex.org/C88959737","wikidata":"https://www.wikidata.org/wiki/Q1546627","display_name":"Strategy","level":3,"score":0.44278827},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11023867},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.1029498},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.64}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1874399837","https://openalex.org/W1964439345","https://openalex.org/W1964972187","https://openalex.org/W1998145596","https://openalex.org/W2024170198","https://openalex.org/W2066220442","https://openalex.org/W2067064328","https://openalex.org/W2095642840","https://openalex.org/W2147724018","https://openalex.org/W2161824679","https://openalex.org/W2182086368","https://openalex.org/W2276163040","https://openalex.org/W2564748202","https://openalex.org/W2591919231","https://openalex.org/W2625696220","https://openalex.org/W2754440774","https://openalex.org/W3098914111","https://openalex.org/W3105952379","https://openalex.org/W4232105848"],"related_works":["https://openalex.org/W4385561494","https://openalex.org/W4214823990","https://openalex.org/W317122954","https://openalex.org/W3038682671","https://openalex.org/W2888555025","https://openalex.org/W2887801992","https://openalex.org/W2803144261","https://openalex.org/W2593385889","https://openalex.org/W2463700031","https://openalex.org/W2126090518"],"abstract_inverted_index":{"Most":[0],"of":[1,127,135,159,191,195],"the":[2,39,64,79,103,106,109,149,160,165,170,175,183,214],"cybersecurity":[3,30,76],"research":[4,31,85],"focus":[5],"on":[6,148],"either":[7],"presenting":[8],"a":[9,17,24,93,112,220],"specific":[10,18],"vulnerability":[11],"%or":[12],"hacking":[13],"technique,":[14],"or":[15,57],"proposing":[16],"defense":[19,58,204,228],"algorithm":[20],"to":[21,38,62,101,120,123,182,224],"defend":[22],"against":[23],"well-defined":[25],"attack":[26,56,140,153],"scheme.":[27],"Although":[28],"such":[29],"is":[32,119],"important,":[33],"few":[34],"have":[35,124],"paid":[36],"attention":[37],"dynamic":[40,94],"interactions":[41,104],"between":[42,105],"attackers":[43],"and":[44,51,86,108,139,155,198],"defenders,":[45],"where":[46,174],"both":[47],"sides":[48],"are":[49,131],"intelligent":[50],"will":[52],"dynamically":[53],"change":[54],"their":[55,68],"strategies":[59,129],"in":[60,78,133,157],"order":[61],"gain":[63],"upper":[65],"hand":[66],"over":[67],"opponents.":[69],"This":[70],"'cyberwar'":[71],"phenomenon":[72],"exists":[73],"among":[74],"most":[75],"incidents":[77],"real":[80],"world,":[81],"which":[82],"warrants":[83],"special":[84],"analysis.":[87],"In":[88],"this":[89],"paper,":[90],"we":[91,187],"propose":[92],"game":[95,173,216],"theoretic":[96],"framework":[97],"(i.e.,":[98],"hyper":[99,203],"defense)":[100],"analyze":[102],"attacker":[107],"defender":[110],"as":[111],"non-cooperative":[113],"security":[114,172],"game.":[115],"The":[116],"key":[117],"idea":[118],"model":[121,208],"attackers/defenders":[122],"multiple":[125],"levels":[126],"attack/defense":[128],"that":[130,213],"different":[132,193],"terms":[134],"effectiveness,":[136],"strategy":[137,146,180],"costs,":[138],"gains/damages.":[141],"Each":[142],"player":[143],"adjusts":[144],"his":[145],"based":[147],"strategy's":[150],"cost,":[151],"potential":[152],"gain/damage,":[154],"effectiveness":[156],"anticipating":[158],"opponent's":[161],"strategy.":[162],"We":[163],"study":[164],"achievable":[166],"Nash":[167],"equilibrium":[168],"for":[169],"attacker-defender":[171],"players":[176],"employ":[177],"an":[178],"efficient":[179],"according":[181],"obtained":[184],"equilibrium.":[185],"Furthermore,":[186],"present":[188],"case":[189],"studies":[190],"three":[192],"types":[194],"network":[196],"attacks":[197],"put":[199],"forth":[200],"how":[201],"our":[202],"system":[205,218],"can":[206],"successfully":[207],"them.":[209],"Simulation":[210],"results":[211],"show":[212],"proposed":[215],"theoretical":[217],"achieves":[219],"better":[221],"performance":[222],"compared":[223],"two":[225],"other":[226],"fixed-strategy":[227],"systems.":[229]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2887801992","counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-03-29T22:11:53.440018","created_date":"2018-08-22"}