Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis

被引:4
|
作者
Zhang, Ming [1 ]
Zheng, Zizhan [2 ]
Shroff, Ness B. [1 ,3 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43202 USA
[2] Tulane Univ, Dept Comp Sci, New Orleans, LA 70118 USA
[3] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43202 USA
来源
关键词
Game theory; resource constraints; stealthy attacks;
D O I
10.1109/TCNS.2020.2993281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a stealthy attacker, and an observable defender. In our model, the attacker can fully observe the defender's behavior and the system state, whereas the defender has zero feedback information. Furthermore, a strict resource constraint is introduced to limit the frequency of the attacks/defenses for both players. We characterize the best responses for both attacker and defender under both nonadaptive and adaptive strategies. We then study the sequential game where the defender first announces its strategy and the attacker then responds accordingly. We have designed an algorithm that finds a nearly optimal strategy for the defender and provides a full analysis of its complexity and performance guarantee.
引用
收藏
页码:1665 / 1677
页数:13
相关论文
共 50 条
  • [31] Game-Theoretic Deception Methods for Perfectly and Bounded Rational Stealthy Attackers
    Fotiadis, Filippos
    Vamvoudakis, Kyriakos G.
    2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 7962 - 7969
  • [32] Game-theoretic multiple target tracking
    Yang, Ming
    Yu, Ting
    Wu, Ying
    2007 IEEE 11TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1-6, 2007, : 897 - +
  • [33] Counterterrorism - A game-theoretic analysis
    Arce, DG
    Sandler, T
    JOURNAL OF CONFLICT RESOLUTION, 2005, 49 (02) : 183 - 200
  • [34] A Game-Theoretic Model on Coalitional Attacks in Smart Grid
    Yang, Xinyu
    He, Xiaofei
    Lin, Jie
    Yu, Wei
    Yang, Qingyu
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 435 - 442
  • [35] A game-theoretic analysis of skyscrapers
    Helsley, Robert W.
    Strange, William C.
    JOURNAL OF URBAN ECONOMICS, 2008, 64 (01) : 49 - 64
  • [36] Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
    Sagduyu, Yalin E.
    Erpek, Tugba
    Shi, Yi
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [37] A Game-Theoretic Defense Against Data Poisoning Attacks in Distributed Support Vector Machines
    Zhang, Rui
    Zhu, Quanyan
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [38] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [39] A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks
    Mneimneh, Saad
    Bhunia, Suman
    Vazquez-Abad, Felisa
    Sengupta, Shamik
    PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 577 - 592
  • [40] Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback
    Feng, Xiaotao
    Zheng, Zizhan
    Cansever, Derya
    Swami, Ananthram
    Mohapatra, Prasant
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 277 - 282