A Two-Stage Deception Game for Network Defense

被引:4
|
作者
Wang, Wei [1 ]
Zeng, Bo [1 ]
机构
[1] Univ Pittsburgh, Pittsburgh, PA 15260 USA
关键词
Two-stage security game; Game theory; Cyber security; Network security; Deception;
D O I
10.1007/978-3-030-01554-1_33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computer network is always under the threat of adversaries. Before launching any real attacks, adversaries may scan and probe the systems to gain some key information. In this paper, we build a two-stage deception game to determine how to answer attackers' scan and probe queries to minimize defender's expected loss. To achieve optimal defense strategy, a sophisticated mixed integer program is formulated. To support fast computation in reality, a two-stage heuristic method is also developed based on the problem's structural properties. Computational experiment shows that after scanning the whole network, adversary's probe against some hosts and how such probe is responded have significant influences on defender's expected loss. Our heuristic method is able to produce high quality solutions with a drastically improved computational performance.
引用
收藏
页码:569 / 582
页数:14
相关论文
共 50 条
  • [1] A two-stage network interdiction-monitoring game
    Nguyen, Di H. H.
    Song, Yongjia
    Smith, J. Cole
    [J]. NETWORKS, 2023, 81 (03) : 334 - 358
  • [2] Two-Stage Network Formation Game with Heterogeneous Players and Private Information
    Sun, Ping
    Parilina, Elena
    [J]. CONTRIBUTIONS TO GAME THEORY AND MANAGEMENT, VOL XII, 2019, 12 : 316 - 324
  • [3] A bargaining game model for measuring performance of two-stage network structures
    Du, Juan
    Liang, Liang
    Chen, Yao
    Cook, Wade D.
    Zhu, Joe
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2011, 210 (02) : 390 - 397
  • [4] COMMUNICATION AND COORDINATION IN A TWO-STAGE GAME
    Bjedov, Tjasa
    Madies, Thierry
    Villeval, Marie Claire
    [J]. ECONOMIC INQUIRY, 2016, 54 (03) : 1519 - 1540
  • [5] Two-stage network games
    L. A. Petrosyan
    A. A. Sedakov
    A. O. Bochkarev
    [J]. Automation and Remote Control, 2016, 77 : 1855 - 1866
  • [6] Research on active defense based on multi-stage cyber deception game
    Hu, Yongjin
    Ma, Jun
    Guo, Yuanbo
    Zhang, Han
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (08): : 32 - 42
  • [7] Two-stage network games
    Petrosyan, L. A.
    Sedakov, A. A.
    Bochkarev, A. O.
    [J]. AUTOMATION AND REMOTE CONTROL, 2016, 77 (10) : 1855 - 1866
  • [8] A two-stage Bertrand-Edgeworth game
    Tasnádi, A
    [J]. ECONOMICS LETTERS, 1999, 65 (03) : 353 - 358
  • [9] A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion
    Gao, Chungang
    Wang, Yongjie
    Xiong, Xinli
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [10] A Two-Stage Network for Image Deblurring
    Pan, Ze
    Lv, Qunbo
    Tan, Zheng
    [J]. IEEE ACCESS, 2021, 9 : 76707 - 76715