A Hypergame Model for Information Security

Volume: 3 Number: 1 March 31, 2014
  • Yadigar Imamverdiyev
EN

A Hypergame Model for Information Security

Abstract

Game theory is one of the most powerful mathematical tools to model information security decision making. However, in game theory it is assumed that all the players have complete knowledge about each player’s strategies, preferences, and decision rules used. This assumption is very strong, in reality there is often significant information asymmetry between players. In many real world situations, decision makers do not always have all the information about each player’s true intentions, strategies or preferences. Consequently, they have to perceive the situation from their own points of view, and may err in their perceptions. Since the early developments of game theory attempts have been made to incorporate misperceptions in game models of either incomplete or imperfect information. However, most of these attempts are based on quantities (as probabilities, risk factors, etc.) which are too subjective in general. In this paper, we consider a special family of games of incomplete information called hypergames. Hypergame theory extends classical game theory with the ability to deal with differences in players' misperceptions. In the context of hypergames, few works have addressed the study of information security decision making. This paper presents a hypergame approach as an analysis tool in the context of information security. The proposed two level hypergame models defender’s and attacker’s perception of the information security situation as a series of games. Finally, we conclude and present some future work.

Keywords

References

  1. D. Fudenberg, and J. Tirole. Game theory. MIT Press/Massachussetts, 1995.
  2. K. Sallhammar, S. J. Knapskog, and B. E. Helvik, “Using stochastic game theory to compute the expected behavior of attackers”, International Symposium on Applications and the Internet (Saint’2005). Trento, Italy, pp. 102-105, Jan. 31 2005-Feb. 4 2005.
  3. P. G. Bennett, “Toward a theory of hypergames”, Omega, Vol. 5, No. 6, pp. 749-751, 1977.
  4. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, Q. Wu, “A survey of game theory as applied to network security”, 43rd Hawaii International Conference on System Sciences (HICSS), Hawaii, pp.1-10, 5-8 Jan. 2010.
  5. M. H. Manshaei, Q. Zhu, T. Alpcan, T. Başar, J.-P. Hubaux, “Game theory meets network security and privacy”, ACM Computing Surveys, Vol. 45, No. 3, Article 25, June 2013.
  6. A. Singh, A. Lakhotia, and A. Walenstein, “Malware antimalware games,” Proc. 5th International Conference on Information-Warfare & Security (ICIW), Ohio, USA, pp. 319-327, 8-9 April 2010.
  7. P. Maillé, P. Reichl, and B. Tuffin, “Of threats and costs: A game-theoretic approach to security risk management”, Springer Optimization and Its Applications, Vol. 46, pp. 33-53, 2011.
  8. A. Patcha, J. M. Park, “A game theoretic formulation for intrusion detection in mobile ad hoc networks,” International Journal of Network Security, Vol. 2, No. 2, pp. 131–137, March 2006.

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Yadigar Imamverdiyev This is me

Publication Date

March 31, 2014

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2014 Volume: 3 Number: 1

APA
Imamverdiyev, Y. (2014). A Hypergame Model for Information Security. International Journal of Information Security Science, 3(1), 148-155. https://izlik.org/JA97KE45LU
AMA
1.Imamverdiyev Y. A Hypergame Model for Information Security. IJISS. 2014;3(1):148-155. https://izlik.org/JA97KE45LU
Chicago
Imamverdiyev, Yadigar. 2014. “A Hypergame Model for Information Security”. International Journal of Information Security Science 3 (1): 148-55. https://izlik.org/JA97KE45LU.
EndNote
Imamverdiyev Y (March 1, 2014) A Hypergame Model for Information Security. International Journal of Information Security Science 3 1 148–155.
IEEE
[1]Y. Imamverdiyev, “A Hypergame Model for Information Security”, IJISS, vol. 3, no. 1, pp. 148–155, Mar. 2014, [Online]. Available: https://izlik.org/JA97KE45LU
ISNAD
Imamverdiyev, Yadigar. “A Hypergame Model for Information Security”. International Journal of Information Security Science 3/1 (March 1, 2014): 148-155. https://izlik.org/JA97KE45LU.
JAMA
1.Imamverdiyev Y. A Hypergame Model for Information Security. IJISS. 2014;3:148–155.
MLA
Imamverdiyev, Yadigar. “A Hypergame Model for Information Security”. International Journal of Information Security Science, vol. 3, no. 1, Mar. 2014, pp. 148-55, https://izlik.org/JA97KE45LU.
Vancouver
1.Yadigar Imamverdiyev. A Hypergame Model for Information Security. IJISS [Internet]. 2014 Mar. 1;3(1):148-55. Available from: https://izlik.org/JA97KE45LU