1
|
Cheng Z, Chen G, Hong Y. Zero-determinant strategy in stochastic Stackelberg asymmetric security game. Sci Rep 2023; 13:11308. [PMID: 37438579 PMCID: PMC10338512 DOI: 10.1038/s41598-023-38460-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/02/2023] [Accepted: 07/08/2023] [Indexed: 07/14/2023] Open
Abstract
In a stochastic Stackelberg asymmetric security game, the strong Stackelberg equilibrium (SSE) strategy is a popular option for the defender to get the highest utility against an attacker with the best response (BR) strategy. However, the attacker may be a boundedly rational player, who adopts a combination of the BR strategy and a fixed stubborn one. In such a condition, the SSE strategy may not maintain the defensive performance due to the stubbornness. In this paper, we focus on how the defender can adopt the unilateral-control zero-determinate (ZD) strategy to confront the boundedly rational attacker. At first, we verify the existence of ZD strategies for the defender. We then investigate the performance of the defender's ZD strategy against a boundedly rational attacker, with a comparison of the SSE strategy. Specifically, when the attacker's strategy is close to the BR strategy, the ZD strategy admits a bounded loss for the defender compared with the SSE strategy. Conversely, when the attacker's strategy is close to the stubborn strategy, the ZD strategy can bring higher defensive performance for the defender than the SSE strategy does.
Collapse
Affiliation(s)
- Zhaoyang Cheng
- Key Laboratory of Systems and Control, Academy of Mathematics and Systems Science, Beijing, 100190, China
- School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing, 100049, China
| | - Guanpu Chen
- School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, 11428, Stockholm, Sweden.
| | - Yiguang Hong
- Department of Control Science and Engineering, Tongji University, Shanghai, 201804, China
- Shanghai Research Institute for Intelligent Autonomous Systems, Tongji University, Shanghai, 210201, China
| |
Collapse
|
2
|
Ma W, Liu W, McAreavey K, Luo X, Jiang Y, Zhan J, Chen Z. A decision support framework for security resource allocation under ambiguity. INT J INTELL SYST 2021. [DOI: 10.1002/int.22288] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
Affiliation(s)
- Wenjun Ma
- Guangzhou Key Laboratory of Big Data and Intelligent Education, School of Computer Science South China Normal University Guangzhou China
| | - Weiru Liu
- School of Computer Science, Electrical and Electronic Engineering, and Engineering Maths University of Bristol Bristol UK
| | - Kevin McAreavey
- School of Computer Science, Electrical and Electronic Engineering, and Engineering Maths University of Bristol Bristol UK
| | - Xudong Luo
- Guangxi Key Lab of Multi‐Source Information Mining & Security, Faculty of Computer Science and Information Technology Guangxi Normal University Guilin China
| | - Yuncheng Jiang
- Guangzhou Key Laboratory of Big Data and Intelligent Education, School of Computer Science South China Normal University Guangzhou China
| | - Jieyu Zhan
- Guangzhou Key Laboratory of Big Data and Intelligent Education, School of Computer Science South China Normal University Guangzhou China
| | - Zhenzhou Chen
- Guangzhou Key Laboratory of Big Data and Intelligent Education, School of Computer Science South China Normal University Guangzhou China
| |
Collapse
|
3
|
Durkota K, Lisý V, Bošanský B, Kiekintveld C, Pěchouček M. Hardening networks against strategic attackers using attack graph games. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101578] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
|
4
|
Zeng C, Ren B, Liu H, Chen J. Applying the Bayesian Stackelberg Active Deception Game for Securing Infrastructure Networks. ENTROPY 2019; 21:909. [PMCID: PMC7515438 DOI: 10.3390/e21090909] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/07/2019] [Accepted: 09/16/2019] [Indexed: 06/17/2023]
Abstract
With new security threats cropping up every day, finding a real-time and smart protection strategy for critical infrastructure has become a big challenge. Game theory is suitable for solving this problem, for it provides a theoretical framework for analyzing the intelligent decisions from both attackers and defenders. However, existing methods are only based on complete information and only consider a single type of attacker, which is not always available in realistic situations. Furthermore, although infrastructure interconnection has been greatly improved, there is a lack of methods considering network characteristics. To overcome these limitations, we focus on the problem of infrastructure network protection under asymmetry information. We present a novel method to measure the performance of infrastructure from the network perspective. Moreover, we propose a false network construction method to simulate how the defender applies asymmetric information to defend against the attacker actively. Meanwhile, we consider multiple types of attackers and introduce the Bayesian Stackelberg game to build the model. Experiments in real infrastructure networks reveal that our approach can improve infrastructure protection performance. Our method gives a brand new way to approach the problem of infrastructure security defense.
Collapse
|
5
|
Tefera MK, Yang X. A Game-Theoretic Framework to Preserve Location Information Privacy in Location-based Service Applications. SENSORS 2019; 19:s19071581. [PMID: 30939858 PMCID: PMC6479801 DOI: 10.3390/s19071581] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2019] [Revised: 03/07/2019] [Accepted: 03/28/2019] [Indexed: 11/16/2022]
Abstract
Recently, the growing ubiquity of location-based service (LBS) technology has increased the likelihood of users' privacy breaches due to the exposure of their real-life information to untrusted third parties. Extensive use of such LBS applications allows untrusted third-party adversarial entities to collect large quantities of information regarding users' locations over time, along with their identities. Due to the high risk of private information leakage using resource-constrained smart mobile devices, most LBS users may not be adequately encouraged to access all LBS applications. In this paper, we study the use of game theory to protect users against private information leakage in LBSs due to malicious or selfish behavior of third-party observers. In this study, we model a scenario of privacy protection gameplay between a privacy protector and an outside visitor and then derive the situation of the prisoner's dilemma game to analyze the traditional privacy protection problems. Based on the analysis, we determine the corresponding benefits to both players using a point of view that allows the visitor to access a certain amount of information and denies further access to the user's private information when exposure of privacy is forthcoming. Our proposed model uses the collection of private information about historical access data and current LBS access scenario to effectively determine the probability that the visitor's access is an honest one. Moreover, we present the procedures involved in the privacy protection model and framework design, using game theory for decision-making. Finally, by employing a comparison analysis, we perform some experiments to assess the effectiveness and superiority of the proposed game-theoretic model over the traditional solutions.
Collapse
Affiliation(s)
- Mulugeta Kassaw Tefera
- School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China.
| | - Xiaolong Yang
- School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China.
| |
Collapse
|
6
|
|
7
|
Alvim MS, Chatzikokolakis K, Kawamoto Y, Palamidessi C. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. ENTROPY 2018; 20:e20050382. [PMID: 33265472 PMCID: PMC7512901 DOI: 10.3390/e20050382] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2018] [Revised: 05/08/2018] [Accepted: 05/11/2018] [Indexed: 11/29/2022]
Abstract
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choice among different protocols, and its effect on the amount of leakage depends heavily on whether or not this choice is visible to the attacker. In this work, we consider operators for modeling visible and hidden choice in protocol composition, and we study their algebraic properties. We then formalize the interplay between defender and attacker in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage. We consider various kinds of leakage games, depending on whether players act simultaneously or sequentially, and on whether or not the choices of the defender are visible to the attacker. In the case of sequential games, the choice of the second player is generally a function of the choice of the first player, and his/her probabilistic choice can be either over the possible functions (mixed strategy) or it can be on the result of the function (behavioral strategy). We show that when the attacker moves first in a sequential game with a hidden choice, then behavioral strategies are more advantageous for the defender than mixed strategies. This contrasts with the standard game theory, where the two types of strategies are equivalent. Finally, we establish a hierarchy of these games in terms of their information leakage and provide methods for finding optimal strategies (at the points of equilibrium) for both attacker and defender in the various cases.
Collapse
Affiliation(s)
- Mário S. Alvim
- Computer Science Department, Universidade Federal de Minas Gerais (UFMG), Belo Horizonte-MG 31270-110, Brazil
- Correspondence: (M.S.A.); (C.P.)
| | - Konstantinos Chatzikokolakis
- École Polytechnique, 91128 Palaiseau, France
- Centre National de la Recherche Scientifique (CNRS), 91190 Gif-sur-Yvette, France
| | - Yusuke Kawamoto
- National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8560, Japan
| | - Catuscia Palamidessi
- École Polytechnique, 91128 Palaiseau, France
- INRIA Saclay, 91120 Palaiseau, France
- Correspondence: (M.S.A.); (C.P.)
| |
Collapse
|
8
|
Guerrero D, Carsteanu AA, Clempner JB. Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.01.005] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
9
|
Piccinelli R, Sansavini G, Lucchetti R, Zio E. A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2017; 37:2182-2190. [PMID: 28230257 DOI: 10.1111/risa.12781] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/15/2013] [Revised: 10/30/2016] [Accepted: 11/30/2016] [Indexed: 06/06/2023]
Abstract
The protection and safe operations of power systems heavily rely on the identification of the causes of damage and service disruption. This article presents a general framework for the assessment of power system vulnerability to malicious attacks. The concept of susceptibility to an attack is employed to quantitatively evaluate the degree of exposure of the system and its components to intentional offensive actions. A scenario with two agents having opposing objectives is proposed, i.e., a defender having multiple alternatives of protection strategies for system elements, and an attacker having multiple alternatives of attack strategies against different combinations of system elements. The defender aims to minimize the system susceptibility to the attack, subject to budget constraints; on the other hand, the attacker aims to maximize the susceptibility. The problem is defined as a zero-sum game between the defender and the attacker. The assumption that the interests of the attacker and the defender are opposite makes it irrelevant whether or not the defender shows the strategy he/she will use. Thus, the approaches "leader-follower game" or "simultaneous game" do not provide differences as far as the results are concerned. The results show an example of such a situation, and the von Neumann theorem is applied to find the (mixed) equilibrium strategies of the attacker and of the defender.
Collapse
Affiliation(s)
- R Piccinelli
- Dipartimento di Energia - Politecnico di Milano, Milano, Italy
| | - G Sansavini
- Reliability and Risk Engineering Laboratory, Institute of Energy Technology, Department of Mechanical and Process Engineering, ETH Zürich, Zurich, Switzerland
| | - R Lucchetti
- Dipartimento di Matematica - Politecnico di Milano, Milano, Italy
| | - E Zio
- Chair System Science and The Energy Challenge, Fondation Electricite' de France (EDF), CentraleSupélec, Université Paris-Saclay, Chatenay-Malabry, France
- Dipartimento di Energia - Politecnico di Milano, Milano, Italy
| |
Collapse
|
10
|
Rota Bulo S, Biggio B, Pillai I, Pelillo M, Roli F. Randomized Prediction Games for Adversarial Machine Learning. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2017; 28:2466-2478. [PMID: 27514067 DOI: 10.1109/tnnls.2016.2593488] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
Abstract
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.
Collapse
Affiliation(s)
| | - Battista Biggio
- Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
| | - Ignazio Pillai
- Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
| | - Marcello Pelillo
- Dipartimento di Scienze Ambientali, Informatica e Statistica, Ca' Foscari University of Venice, Venice, Italy
| | - Fabio Roli
- Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
| |
Collapse
|
11
|
Basilico N, De Nittis G, Gatti N. Adversarial patrolling with spatially uncertain alarm signals. ARTIF INTELL 2017. [DOI: 10.1016/j.artint.2017.02.007] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
12
|
Tominac P, Mahalec V. A game theoretic framework for petroleum refinery strategic production planning. AIChE J 2017. [DOI: 10.1002/aic.15644] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
Affiliation(s)
- Philip Tominac
- Dept. of Chemical Engineering; McMaster University; Hamilton ON L8S 4L8 Canada
| | - Vladimir Mahalec
- Dept. of Chemical Engineering; McMaster University; Hamilton ON L8S 4L8 Canada
| |
Collapse
|
13
|
Barrett S, Rosenfeld A, Kraus S, Stone P. Making friends on the fly: Cooperating with new teammates. ARTIF INTELL 2017. [DOI: 10.1016/j.artint.2016.10.005] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
14
|
Jajodia S, Park N, Serra E, Subrahmanian V. Using temporal probabilistic logic for optimal monitoring of security events with limited resources. JOURNAL OF COMPUTER SECURITY 2016. [DOI: 10.3233/jcs-160555] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
Affiliation(s)
- Sushil Jajodia
- Center for Secure Information Systems, George Mason University, Fairfax, USA. E-mail:
| | - Noseong Park
- Institute for Advanced Computer Studies, University of Maryland, College Park, USA. E-mails: ,
| | - Edoardo Serra
- Computer Science Department, Boise State University, Boise, USA. E-mail:
| | - V.S. Subrahmanian
- Institute for Advanced Computer Studies, University of Maryland, College Park, USA. E-mails: ,
| |
Collapse
|
15
|
Conforming coalitions in Markov Stackelberg security games: Setting max cooperative defenders vs. non-cooperative attackers. Appl Soft Comput 2016. [DOI: 10.1016/j.asoc.2016.05.037] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
|
16
|
Yang R, Kiekintveld C, Ordóñez F, Tambe M, John R. Improving resource allocation strategies against human adversaries in security games: An extended study. ARTIF INTELL 2013. [DOI: 10.1016/j.artint.2012.11.004] [Citation(s) in RCA: 70] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
17
|
Pita J, Jain M, Tambe M, Ordóñez F, Kraus S. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. ARTIF INTELL 2010. [DOI: 10.1016/j.artint.2010.07.002] [Citation(s) in RCA: 106] [Impact Index Per Article: 7.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|