Game-theoretical Approaches to Cyber-crime Monitoring
Asian Journal of Research in Computer Science
https://doi.org/10.9734/AJRCOS/2022/V14I4309Abstract
Our society's diploma of reliance on IT and our online world is developing daily. Cyberspace, the call given to the worldwide and dynamic domain, composed of the infrastructure of the statistics era consisting of the net networks and statistics and telecommunications structures has supplied extraordinary globalization that gives new opportunities, but additionally includes new challenges, risks, and threats. Knowledge of its threats, dealing with the risks, and constructing suitable prevention, defense, detection, evaluation, investigation, and recuperation is essential. Given the present-day assessment of the statistics safety and intrusion detection, there's without a doubt a want for a choice and manipulation framework to cope with problems like assault modeling, evaluation of detected threats, and choice of reaction actions. We look at the goals of designing a mathematical version for gamified cybercrime tracking in a community environment.
References (18)
- Rabinovitch E. The neverending saga of internet security: why? how? and what to do next? IEEE Commun Mag. 2001; 39(5):56-8. DOI: 10.1109/MCOM.2001.920859
- Singer PW, Friedman A. Cybersecurity and Cyberwar: What everybody needs to know. NY: Oxford Univeristy Press; 2014.
- Cruz A. Cyber crime and how it affects you. Mon Newsl. 2013;7(1).
- Halder D, Jaishankar K. Cyber crime and the victimization of women: laws, rights and regulations. Information science reference; 2012.
- Manshaei MH, Zhu Q, Alpcan T, Basar T, Hubaux J-P. Game theory meets network security and privacy. Acad Med; 2010.
- Sallhammar K, Knapskog SJ, Helvik BE. Using stochastic game theory to compute the expected behavior of attackers. Symposium on Applications and the Internet Workshops. Trento, Italy: IEEE Publications Xplore. 2005;102-5. DOI: 10.1109/SAINTW.2005.1619988
- Milind T, Manish J. Introduction and overview of security games. University of Southern California. Cambridge University Press; 2011.
- Alpcan T, Başar T. Network security -A decision and game-theoretic approach. Cambridge University Press; 2011.
- Bonanno G. University of calofornia; 2015 [cited Sep 2, 2022].
- Russell D, Gangemi G. Computer security basics. Sebastopol: O'Reilly and Associates. 1991;CA0.
- Jajodia S, Noel S. Topological vulnerability analysis. In: Cyber situational awareness. Boston: Springer. 2010;139-54. DOI: 10.1007/978-1-4419-0140-8_7
- Clark KS, Bushnell L, Poovendran R. A game-theoretic approach to IP address randomization in decoy-based cyber defense. Proceedings of the 6th international conference, GameSec 2015, London, UK. Springer; 2015.
- Zhiheng X, Arvind E. A game-Theoritic approach to secure estimation and control for cyber physical systems with a digital twin. Acad Med/IEEE International Conference on Cyber-Physical Systems (ICCPS). 2020;20-9.
- Zhang M, Zheng Z, Shroff NB. A game theoretic model for defending against stealthy attacks with limited resources. Proceedings of the 6th international conference, GameSec 2015, London, UK. Springer; 2015.
- Hayel Y, Zhu Q. Attack-aware cyber insurance for risk sharing in computer networks. Proceedings of the 6th international conference, GameSec 2015, London, UK. Springer; 2015.
- Durkota K, Lisy V, Bosansky B, Kiekintveld C. Approximate solutions for attack graph games with imperfect information. Proceedings of the 6th international conference, GameSec 2015, London, UK. Springer; 2015.
- Akinwumi DA, Iwasokun GB, Alese BK, Oluwadare SA. A review of game theory approach to cyber security risk management. Niger J Technol. Proceedings of the 6th international conference, GameSec 2015, London, UK. 2017;36(4):1271-85. DOI: 10.4314/njt.v36i4.38
- Morton D, Stephen D, Brams J. Encyclopedia Britannical. Retrieved from Encyclpedia Britannical; 2022. Available:Http://www. Available:http://britannical.com/science/ga me-theory _________________________________________________________________________________