DocumentCode :
2204885
Title :
Using Game Theory to Reveal Vulnerability for Complex Networks
Author :
Zhang, Xiaoying ; Guo, Chi ; Wang, Lina
Author_Institution :
Comput. Sch., Wuhan Univ., Wuhan, China
fYear :
2010
fDate :
June 29 2010-July 1 2010
Firstpage :
978
Lastpage :
984
Abstract :
This paper proposes a method to identify network vulnerability based on Monte Carlo sampling and game theory. A two-player (attacker vs. immunizer), non-cooperative, constant-sum game model is used to obtain a mixed Nash equilibrium strategy. In this strategy, each node has a probability of being selected by the immunizer. These probabilities reflect the vulnerabilities of network nodes. With the implementation of this mixed strategy, the immunizer will achieve more equilibrium and safe profits. Moreover, this paper finds that the vulnerabilities of nodes in complex networks do not completely depend on static topology characteristics, such as node degree or betweenness.
Keywords :
Monte Carlo methods; complex networks; game theory; security of data; Monte Carlo sampling; complex network; game theory; nash equilibrium strategy; network vulnerability; topology characteristic; Delay effects; Games; Hazards; Monte Carlo methods; Network topology; Security; Topology; Monte Carlo sampling; complex networks; game theory; network immunization; network vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
Conference_Location :
Bradford
Print_ISBN :
978-1-4244-7547-6
Type :
conf
DOI :
10.1109/CIT.2010.180
Filename :
5578487
Link To Document :
بازگشت