Skip to main content

2023 | OriginalPaper | Buchkapitel

Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality

verfasst von : Ryan Gabrys, Mark Bilinski, Justin Mauger, Daniel Silva, Sunny Fugate

Erschienen in: Decision and Game Theory for Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work, we consider a zero-sum game between an adaptive defender and a potentially deceptive attacker who is able to vary their degree of rationality as a deceptive ruse. Under this setup, we provide a complete characterization of the deception space of the attacker and uncover optimal strategies for adaptive defender against a deceptive attacker. In addition, we consider the setup in which both the attacker and defender are allowed to evolve their strategies over time. In this setting, one of our main results is to demonstrate that allowing the attacker to vary their degree of rationality can significantly impact the game in favor of the attacker.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In other words, the value of \(\lambda ^{\ell }\) is unique.
 
2
By arbitrary, we mean that \(\lambda ^{\ell }\) can be any real value.
 
3
In other words, we consider the case where there may not exist a parameter \(\lambda '\) whereby we can write the observed distribution as \(\left( q_1', q_2', \ldots , q_T' \right) = \left( q_1(x,\lambda '), q_2(x,\lambda '), \ldots , q_T(x,\lambda ') \right) \) in the next section.
 
Literatur
1.
Zurück zum Zitat Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016) Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016)
2.
Zurück zum Zitat Alshamrani, A., et al.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851–1877 (2019)CrossRef Alshamrani, A., et al.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851–1877 (2019)CrossRef
3.
Zurück zum Zitat Whaley, B.: Stratagem: Deception and Surprise in War. Center for International Studies, Massachusetts Institute of Technology, Cambridge (1969) Whaley, B.: Stratagem: Deception and Surprise in War. Center for International Studies, Massachusetts Institute of Technology, Cambridge (1969)
6.
Zurück zum Zitat Cranford, E.A., et al.: Toward personalized deceptive signaling for cyber defense using cognitive models. Top. Cogn. Sci. 12(3), 992–1011 (2020)CrossRef Cranford, E.A., et al.: Toward personalized deceptive signaling for cyber defense using cognitive models. Top. Cogn. Sci. 12(3), 992–1011 (2020)CrossRef
7.
Zurück zum Zitat Guo, Q., et al.: Comparing strategic secrecy and Stackelberg commitment in security games. In: 26th International Joint Conference on Artificial Intelligence (2017) Guo, Q., et al.: Comparing strategic secrecy and Stackelberg commitment in security games. In: 26th International Joint Conference on Artificial Intelligence (2017)
8.
Zurück zum Zitat Haghtalab, N., et al.: Three strategies to success: learning adversary models in security games. In: International Joint Conference on Artificial Intelligence (IJCAI) (2016) Haghtalab, N., et al.: Three strategies to success: learning adversary models in security games. In: International Joint Conference on Artificial Intelligence (IJCAI) (2016)
9.
Zurück zum Zitat Mairh, A., et al.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing and Security, pp. 600–605 (2011) Mairh, A., et al.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing and Security, pp. 600–605 (2011)
10.
Zurück zum Zitat Nguyen, T.H., Wang, Y., Sinha, A., Wellman, M.P.: Deception in finitely repeated security games. In: AAAI (2019) Nguyen, T.H., Wang, Y., Sinha, A., Wellman, M.P.: Deception in finitely repeated security games. In: AAAI (2019)
11.
Zurück zum Zitat Pawlick, J., et al.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 52(4) (2019) Pawlick, J., et al.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 52(4) (2019)
12.
Zurück zum Zitat Rabinovich, Z., et al.: Information disclosure as a means to security. In: 14th International Conference on Autonomous Agents and Multi-agent Systems, pp. 645–653 (2015) Rabinovich, Z., et al.: Information disclosure as a means to security. In: 14th International Conference on Autonomous Agents and Multi-agent Systems, pp. 645–653 (2015)
13.
Zurück zum Zitat Rass, S., Zhu, Q.: GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 314–326. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47413-7_18CrossRef Rass, S., Zhu, Q.: GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 314–326. Springer, Cham (2016). https://​doi.​org/​10.​1007/​978-3-319-47413-7_​18CrossRef
15.
Zurück zum Zitat Sinha, A., Kar, D., Tambe, M.: Learning adversary behavior in security games: a PAC model perspective. In: AAMAS 2016 (2016) Sinha, A., Kar, D., Tambe, M.: Learning adversary behavior in security games: a PAC model perspective. In: AAMAS 2016 (2016)
16.
Zurück zum Zitat Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multi-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409–418 (2010)CrossRefMATH Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multi-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409–418 (2010)CrossRefMATH
17.
Zurück zum Zitat Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)CrossRefMATH Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)CrossRefMATH
18.
19.
Zurück zum Zitat Zhang, J., Wang, Y., Zhuang, J.: Modeling multi-target defender-attacker games with quantal response attack strategies. 205, 107165 (2021) Zhang, J., Wang, Y., Zhuang, J.: Modeling multi-target defender-attacker games with quantal response attack strategies. 205, 107165 (2021)
Metadaten
Titel
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality
verfasst von
Ryan Gabrys
Mark Bilinski
Justin Mauger
Daniel Silva
Sunny Fugate
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-26369-9_2

Premium Partner