Dynamic Games for Adaptive Cyber Defense

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: 30 June 2024 | Viewed by 3884

Special Issue Editors


E-Mail Website
Guest Editor
School of Information Technology, Deakin University, 221 Burwood Hwy, Burwood, VIC 3125, Australia
Interests: cybersecurity; complex networks; game theory; dynamical systems

E-Mail Website
Guest Editor
School of Information Technology, Deakin University, 221 Burwood Hwy, Burwood, VIC 3125, Australia
Interests: IoT security and privacy; active defense; social network analysis; blockchain

E-Mail Website
Guest Editor
School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Nanan District, Chongqing 400065, China
Interests: network propagation dynamics; deep learning; signal processing; blockchain

Special Issue Information

Dear Colleagues,

The increasing instances of emerging cyberattacks, as well as their adaptive, stealthy, and deceptive features, call for strategic and adaptive cyber defense approaches. Game theory, a tool for analyzing interactive decision-making processes, has been extensively applied to cybersecurity. In particular, dynamic games, ranging from repeated game and Stackelberg game to signaling game and differential game, provide promising and systematic frameworks to find intelligent and adaptive defensive strategies in various domain-specific security configurations such as moving-target defense and Honey X.

This Special Issue will focus on recent advances in theoretical and applied studies of game-theoretic cybersecurity, with emphasis on how in-depth investigations of dynamic games support decision making towards intelligent and adaptive cyber defense. The Issue aims to bring together computer scientists, mathematicians, and physicists to enrich the research area. Potential topics include, but are not limited to, the following:

  • Repeated game for cyber defense;
  • Stackelberg game for cyber defense;
  • Signaling game for cyber defense;
  • Differential game for cyber defense;
  • Markov decision process model for cyber defense;
  • Reinforcement learning for cyber defense.

Dr. Lu-Xing Yang
Dr. Frank Jiang
Dr. Chenquan Gan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • game theory
  • dynamic game
  • cybersecurity
  • adaptive defense

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

23 pages, 407 KiB  
Review
Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
by Chenquan Gan, Jiabin Lin, Da-Wen Huang, Qingyi Zhu and Liang Tian
Mathematics 2023, 11(14), 3115; https://doi.org/10.3390/math11143115 - 14 Jul 2023
Cited by 4 | Viewed by 3555
Abstract
The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating traditional industry with modern information technology to improve production efficiency and quality. However, the IIoT also faces serious challenges from advanced persistent threats (APTs), a stealthy and persistent [...] Read more.
The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating traditional industry with modern information technology to improve production efficiency and quality. However, the IIoT also faces serious challenges from advanced persistent threats (APTs), a stealthy and persistent method of attack that can cause enormous losses and damages. In this paper, we give the definition and development of APTs. Furthermore, we examine the types of APT attacks that each layer of the four-layer IIoT reference architecture may face and review existing defense techniques. Next, we use several models to model and analyze APT activities in IIoT to identify their inherent characteristics and patterns. Finally, based on a thorough discussion of IIoT security issues, we propose some open research topics and directions. Full article
(This article belongs to the Special Issue Dynamic Games for Adaptive Cyber Defense)
Show Figures

Figure 1

Back to TopTop