Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis

被引:4
|
作者
Zhang, Ming [1 ]
Zheng, Zizhan [2 ]
Shroff, Ness B. [1 ,3 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43202 USA
[2] Tulane Univ, Dept Comp Sci, New Orleans, LA 70118 USA
[3] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43202 USA
来源
关键词
Game theory; resource constraints; stealthy attacks;
D O I
10.1109/TCNS.2020.2993281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a stealthy attacker, and an observable defender. In our model, the attacker can fully observe the defender's behavior and the system state, whereas the defender has zero feedback information. Furthermore, a strict resource constraint is introduced to limit the frequency of the attacks/defenses for both players. We characterize the best responses for both attacker and defender under both nonadaptive and adaptive strategies. We then study the sequential game where the defender first announces its strategy and the attacker then responds accordingly. We have designed an algorithm that finds a nearly optimal strategy for the defender and provides a full analysis of its complexity and performance guarantee.
引用
下载
收藏
页码:1665 / 1677
页数:13
相关论文
共 50 条
  • [1] A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 93 - 112
  • [2] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [3] Defending against terrorist attacks with limited resources
    Powell, Robert
    AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (03) : 527 - 541
  • [4] A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
    Rashidi, Bahman
    Fung, Carol
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1339 - 1344
  • [5] Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
    Johnson, Benjamin
    Laszka, Aron
    Grossklags, Jens
    Vasek, Marie
    Moore, Tyler
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 72 - 86
  • [6] A game-theoretic approach for choosing a detector tuning under stealthy sensor data attacks
    Umsonst, David
    Sandberg, Henrik
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 5975 - 5981
  • [8] Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
    Zhang, Chao
    Jiang, Albert Xin
    Short, Martin B.
    Brantingham, P. Jeffrey
    Tambe, Milind
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 3 - 22
  • [9] Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis
    Wright, Mason
    Venkatesan, Sridhar
    Albanese, Massimiliano
    Wellman, Michael P.
    MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 93 - 104
  • [10] Defending Data Poisoning Attacks in DP-Based Crowdsensing: A Game-Theoretic Approach
    Zheng, Zhirun
    Li, Zhetao
    Huang, Cheng
    Long, Saiqin
    Shen, Xuemin
    IEEE Transactions on Mobile Computing, 2025, 24 (03) : 1859 - 1876