July 25, 2025
Conference Paper

Game Theory in Cybersecurity: A Review of Applications, Models, and Challenges

Abstract

There are no aspects of society left unchanged by the Internet. From commerce to communication, from entertainment to engineering, every industry and sphere of influence exists in a new state thanks to the advent of the information age. This convenience, rarely controverted, comes with capricious actors, who wish to gain access to these systems for myriad reasons, be it financial, political, or mere intellectual gain. This paper presents information that can help readers to better understand the fundamentals of cybersecurity from a game theory perspective, such as coalitional games, Colonel Blotto systems, or how to find Nash Equilibrium. This paper also reviews how game theory can enhance understanding of cybersecurity through cooperative and non-cooperative methods, such as information sharing, defense modeling, and attacker analysis. The authors use the analysis to serve as a bridge for those in either field who need a way to best comprehend the methodologies of their contrasting fields.

Published: July 25, 2025

Citation

Egan M., M. Gautam, and M. Ben-Idris. 2025. Game Theory in Cybersecurity: A Review of Applications, Models, and Challenges. In IEEE Kansas Power and Energy Conference (KPEC 2025 ), April 24-25, 2025, Manhattan, KS, 1-5. Piscataway, New Jersey:IEEE. PNNL-SA-200361. doi:10.1109/KPEC65465.2025.11045006

Research topics