YoVDO

Game of Decoys - Optimal Decoy Routing Through Game Theory

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Game Theory Courses

Course Description

Overview

Explore a conference talk on optimal decoy routing strategies using game theory, presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the research by Milad Nasr and Amir Houmansadr from UMass Amherst, examining various placement strategies, including central and autonomous deployment. Analyze simulation results, sensor profiles, and decoy budgets, with a specific focus on China's network infrastructure. Gain insights into the game-theoretic approach dubbed "Game of Thrones" and its applications in improving decoy routing techniques for enhanced internet freedom and censorship circumvention.

Syllabus

Intro
Decoy Routing
Paper Introduction
Previous Work
Game of Thrones
Placement Strategies
Central Deployment
Model
Simulation Results
Sensor Profiles
Decoy Budgets
Autonomous Deployment
Decoy Fee
China Analysis
Conclusion
Intuition


Taught by

ACM CCS

Related Courses

Game Theory
Stanford University via Coursera
Model Thinking
University of Michigan via Coursera
Online Games: Literature, New Media, and Narrative
Vanderbilt University via Coursera
Games without Chance: Combinatorial Game Theory
Georgia Institute of Technology via Coursera
Competitive Strategy
Ludwig-Maximilians-Universität München via Coursera