Decision and Game Theory for Security
Abstract
Attack--defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack--defense trees and game theory is made explicit. We show that attack--defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure.
- Publication:
-
Lecture Notes in Computer Science
- Pub Date:
- 2010
- DOI:
- 10.1007/978-3-642-17197-0
- arXiv:
- arXiv:1006.2732
- Bibcode:
- 2010LNCS.6442.....A
- Keywords:
-
- Computer Science;
- Data Encryption;
- Computer Communication Networks;
- Systems and Data Security;
- Algorithm Analysis and Problem Complexity;
- Management of Computing and Information Systems;
- Game Theory;
- Economics;
- Social and Behav. Sciences;
- Computer Science - Cryptography and Security;
- Computer Science - Computer Science and Game Theory
- E-Print:
- Added link to springerlink