A Game-Theoretic Model for Defending Against Malicious Users in RecDroid

被引:0
|
作者
Rashidi, Bahman [1 ]
Fung, Carol [1 ]
机构
[1] Virginia Commonwealth Univ, Dept Comp Sci, Richmond, VA 23284 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RecDroid is a smartphone permission response recommendation system which utilizes the responses from expert users in the network to help inexperienced users. However, in such system, malicious users can mislead the recommendation system by providing untruthful responses. Although detection system can be deployed to detect the malicious users, and exclude them from recommendation system, there are still undetected malicious users that may cause damage to RecDroid. Therefore, relying on environment knowledge to detect the malicious users is not sufficient. In this work, we present a game-theoretic model to analyze the interaction (request/response) between RecDroid users and RecDroid system using a static Bayesian game formulation. In the game RecDroid system chooses the best response strategy to minimize its loss from malicious users. We analyze the game model and explain the Nash equilibrium in a static scenario under different conditions. Through the static game model we discuss the strategy that RecDroid can adopt to disincentivize attackers in the system, so that attackers are discouraged to perform malicious users attack. Finally, we discuss several game parameters and their impact on players' outcome.
引用
收藏
页码:1339 / 1344
页数:6
相关论文
共 50 条
  • [1] Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
    Zhang, Chao
    Jiang, Albert Xin
    Short, Martin B.
    Brantingham, P. Jeffrey
    Tambe, Milind
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 3 - 22
  • [3] A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
    Zhang, Lefeng
    Zhu, Tianqing
    Hussain, Farookh Khadeer
    Ye, Dayong
    Zhou, Wanlei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1349 - 1364
  • [4] Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1665 - 1677
  • [5] Selfish users in Aloha: A game-theoretic approach
    MacKenzie, AB
    Wicker, SB
    [J]. IEEE 54TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2001, VOLS 1-4, PROCEEDINGS, 2001, : 1354 - 1357
  • [6] A game-theoretic model for users' participation in ephemeral social vehicular networks
    Esmaeilyfard, Rasool
    Hendessi, Faramarz
    Manshaei, Mohammad Hossein
    Grossklags, Jens
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (12)
  • [7] A game-theoretic model of reinsurance
    Morozov V.V.
    [J]. Computational Mathematics and Modeling, 1998, 9 (4) : 342 - 346
  • [8] GAME-THEORETIC MODEL FOR ORGANIZATIONS
    SHAPLEY, LS
    [J]. ECONOMETRICA, 1971, 39 (04) : 98 - &
  • [9] A game-theoretic model of plagiarism
    Hoover G.A.
    [J]. Atlantic Economic Journal, 2006, 34 (4) : 449 - 454
  • [10] Game-Theoretic Switching Detection of Malicious Attacks in Switched Systems
    Huang, Yabing
    Zhao, Jun
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (02): : 951 - 965