A Stochastic Game Model with Imperfect Information in Cyber Security

被引:0
|
作者
Shiva, Sajjan [1 ]
Roy, Sankardas [1 ]
Bedi, Harkeerat [1 ]
Dasgupta, Dipankar [1 ]
Wu, Qishi [1 ]
机构
[1] Univ Memphis, Memphis, TN 38152 USA
关键词
Network security; game theory; stochastic games; nash equilibrium; imperfect information; simulation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While there are significant advances in information technology and infrastructure which offer new opportunities, cyberspace is still far from completely secured. Recently, researchers have started exploring the applicability of game theory to address the cyber security problem. The interaction between the attacks and the defense mechanisms can be considered as a game played between the attacker and the defender (system administrator). One of the techniques that has been proposed in the literature used stochastic game models to emulate network security games and showed how to determine the best strategy for the defender considering the possible attack strategy used by the attacker. However, the prior research assumes that the players have perfect information about the current state of the game, which generally does not hold in reality. Our model relaxes this assumption and enriches the prior game models by enabling them to capture more realistic scenarios. In particular, this paper presents a theoretical analysis by which the defender can compute his/her best strategy to reach the Nash equilibrium of a stochastic game assuming imperfect sensory information. In addition, this paper shows that if the defender follows the strategy prescribed by the perfect information model, the Nash equilibrium is not achieved and the attacker's payoff can be higher. Our theoretical analysis is tested in simulation experiments and the results validate our approach.
引用
收藏
页码:308 / 318
页数:11
相关论文
共 50 条
  • [1] A stochastic model of cyber attacks with imperfect detection
    Fang, Rui
    Li, Xiaohu
    [J]. COMMUNICATIONS IN STATISTICS-THEORY AND METHODS, 2020, 49 (09) : 2158 - 2175
  • [2] A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
    Orojloo, Named
    Azgomi, Mohammad Abdollahi
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2018, 26 (04) : 929 - 965
  • [3] A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
    Hamed Orojloo
    Mohammad Abdollahi Azgomi
    [J]. Journal of Network and Systems Management, 2018, 26 : 929 - 965
  • [4] EQUILIBRIA IN A STOCHASTIC RESOURCE-MANAGEMENT GAME UNDER IMPERFECT INFORMATION
    KAITALA, V
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1993, 71 (03) : 439 - 453
  • [5] Establishing evolutionary game models for CYBer security information EXchange (CYBEX)
    Tosh, Deepak
    Sengupta, Shamik
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2018, 98 : 27 - 52
  • [6] A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
    Guo, Yuanxiong
    Gong, Yanmin
    Njilla, Laurent L.
    Kamhoua, Charles A.
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 33 - 38
  • [7] Cyber Security Modeling for SCADA Systems Using Stochastic Game Nets Approach
    El Bouchti, Abdelali
    Nahhal, Tarik
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 42 - 47
  • [8] Exploitation of an opponent's imperfect information in a stochastic game with autonomous vehicle application
    McEneaney, WM
    Singh, R
    [J]. 2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 4839 - 4843
  • [9] Game-tree search with adaptation in stochastic imperfect-information games
    Billings, D
    Davidson, A
    Schauenberg, T
    Burch, N
    Bowling, M
    Holte, R
    Schaeffer, J
    Szafron, D
    [J]. COMPUTERS AND GAMES, 2006, 3846 : 21 - 34
  • [10] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    [J]. COMPUTERS & SECURITY, 2013, 38 : 97 - 102