Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis

被引:4
|
作者
Zhang, Ming [1 ]
Zheng, Zizhan [2 ]
Shroff, Ness B. [1 ,3 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43202 USA
[2] Tulane Univ, Dept Comp Sci, New Orleans, LA 70118 USA
[3] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43202 USA
来源
关键词
Game theory; resource constraints; stealthy attacks;
D O I
10.1109/TCNS.2020.2993281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a stealthy attacker, and an observable defender. In our model, the attacker can fully observe the defender's behavior and the system state, whereas the defender has zero feedback information. Furthermore, a strict resource constraint is introduced to limit the frequency of the attacks/defenses for both players. We characterize the best responses for both attacker and defender under both nonadaptive and adaptive strategies. We then study the sequential game where the defender first announces its strategy and the attacker then responds accordingly. We have designed an algorithm that finds a nearly optimal strategy for the defender and provides a full analysis of its complexity and performance guarantee.
引用
收藏
页码:1665 / 1677
页数:13
相关论文
共 50 条
  • [41] A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks
    Cunningham, James D.
    Aved, Alexander
    Ferris, David
    Morrone, Philip
    Tucker, Conrad S.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1188 - 1197
  • [42] A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks
    Signori, Alberto
    Chiariotti, Federico
    Campagnaro, Filippo
    Zorzi, Michele
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9793 - 9804
  • [43] Jamming the Underwater: a Game-Theoretic Analysis of Energy-Depleting Jamming Attacks
    Signori, Alberto
    Pielli, Chiara
    Chiariotti, Federico
    Giordani, Marco
    Campagnaro, Filippo
    Laurenti, Nicola
    Zorzi, Michele
    WUWNET'19: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UNDERWATER NETWORKS & SYSTEMS, 2019,
  • [44] A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems
    Farraj, Abdallah
    Hammad, Eman
    Al Daoud, Ashraf
    Kundur, Deepa
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) : 1846 - 1855
  • [45] A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy
    Chiariotti, Federico
    Pielli, Chiara
    Laurenti, Nicola
    Zanella, Andrea
    Zorzi, Michele
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 16 (01)
  • [46] A Game-Theoretic Analysis of Label Flipping Attacks on Distributed Support Vector Machines
    Zhang, Rui
    Zhu, Quanyan
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [47] Recommendation of educational resources to groups: a game-theoretic approach
    Papamitsiou, Zacharoula
    Economides, Anastasios A.
    PROCEEDINGS OF 2018 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON) - EMERGING TRENDS AND CHALLENGES OF ENGINEERING EDUCATION, 2018, : 760 - 767
  • [48] A Game-Theoretic Approach for Uncoordinated Access to Cognitive Resources
    Farraj, Abdallah
    Hammad, Eman
    2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2021,
  • [49] Ensembles and Multiple Classifiers: A Game-Theoretic View
    Cesa-Bianchi, Nicolo
    MULTIPLE CLASSIFIER SYSTEMS, 2011, 6713 : 2 - 5
  • [50] Insurance with multiple insurers: A game-theoretic approach
    Asimit, Vali
    Boonen, Tim J.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2018, 267 (02) : 778 - 790