Information Technology Reference
In-Depth Information
1
2
3
4
SGUM
1
2
1
2
1
2
selfish
selfish
malicious
altruisc
3
4
3
4
3
4
ZSG
N
N
Fig. 6.1 The extended social group utility maximization ( SGUM ) game captures zero-sum game
( ZSG ), non-cooperative game ( NCG ), and network utility maximization ( NUM ) as special cases
Fig. 6.2 The social group utility maximization ( SGUM ) game framework spans the continuum
space from zero-sum game ( ZSG ) to non-cooperative game ( NCG ) to network utility maximization
( NUM )
The integration of “negative” social ties under the SGUM framework offers a
social perspective on network security: the “adversary” in the context of network
security can be viewed as a malicious user who has “negative” social ties with other
users. As the malicious user can have diverse “negative” social ties with other users, an
interesting future direction is to investigate how the diverse social tie structure would
impact the malicious user's behavior. Furthermore, the rich modeling flexibility
provided by the extended SGUM framework allows us to study the tradeoff between
security and utility. As a malicious user's attack would result in other users' utility
loss, an important question is how it would depend on the malicious user's “negative”
social tie levels with other users.
Search WWH ::




Custom Search