Publication Type
Journal Article
Version
publishedVersion
Publication Date
9-2015
Abstract
Security is a critical concern around the world. In many domains from cybersecurity to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, and the potential uncertainties in adversary payoffs and observations, etc. Computational game theory can help generate such security schedules. Indeed, casting the problem as a Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for scheduling of security resources. These applications are leading to real world use-inspired research in the emerging research area of "security games." The research challenges posed by these applications include scaling up security games to real-world-sized problems, handling multiple types of uncertainty, and dealing with bounded rationality of human adversaries. In cybersecurity domain, the interaction between the defender and adversary is quite complicated with high degree of incomplete information and uncertainty. While solutions have been proposed for parts of the problem space in cybersecurity, the need of the hour is a comprehensive understanding of the whole space including the interaction with the adversary. We highlight the innovations in security games that could be used to tackle the game problem in cybersecurity.
Keywords
game theory, security, limited resources
Discipline
Data Storage Systems | Information Security
Research Areas
Data Science and Engineering
Publication
Journal of Cybersecurity
Volume
1
Issue
1
First Page
19
Last Page
35
ISSN
2057-2085
Identifier
10.1093/cybsec/tyv007
Publisher
Oxford University Press (OUP): Policy C - Option D / Oxford University Press
Citation
SINHA, Arunesh; NGUYEN, Thanh H.; KAR, Debarun; BROWN, Matthew; TAMBE, Milind; and JIANG, Albert Xin.
From physical security to cybersecurity. (2015). Journal of Cybersecurity. 1, (1), 19-35.
Available at: https://ink.library.smu.edu.sg/sis_research/4504
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1093/cybsec/tyv007