Title :
Using Game Theory to Reveal Vulnerability for Complex Networks
Author :
Zhang, Xiaoying ; Guo, Chi ; Wang, Lina
Author_Institution :
Comput. Sch., Wuhan Univ., Wuhan, China
fDate :
June 29 2010-July 1 2010
Abstract :
This paper proposes a method to identify network vulnerability based on Monte Carlo sampling and game theory. A two-player (attacker vs. immunizer), non-cooperative, constant-sum game model is used to obtain a mixed Nash equilibrium strategy. In this strategy, each node has a probability of being selected by the immunizer. These probabilities reflect the vulnerabilities of network nodes. With the implementation of this mixed strategy, the immunizer will achieve more equilibrium and safe profits. Moreover, this paper finds that the vulnerabilities of nodes in complex networks do not completely depend on static topology characteristics, such as node degree or betweenness.
Keywords :
Monte Carlo methods; complex networks; game theory; security of data; Monte Carlo sampling; complex network; game theory; nash equilibrium strategy; network vulnerability; topology characteristic; Delay effects; Games; Hazards; Monte Carlo methods; Network topology; Security; Topology; Monte Carlo sampling; complex networks; game theory; network immunization; network vulnerability;
Conference_Titel :
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
Conference_Location :
Bradford
Print_ISBN :
978-1-4244-7547-6
DOI :
10.1109/CIT.2010.180