Security Games with Partial Surveillance

被引:0
作者
Zhang, Youzhi [1 ]
Luo, Xudong [1 ]
机构
[1] Sun Yat Sen Univ, Inst Log & Cognit, Guangzhou 510275, Guangdong, Peoples R China
来源
AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS | 2014年
关键词
Game theory; Security; Stackelberg games; Decision making;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security games are used to deploy limited security resources. Much work on the topic assumes that attackers have the perfect knowledge of defenders' strategies. However, it is not always the case in real life because an attacker may worry he will be caught if he observes defender's strategy on all targets. To address the issue, this paper proposes a new game model in which the attacker just selects partial targets to observe according to his goal and observation cost. Moreover, our theoretical and experimental analyses show that our model reflects well the way that attackers make decisions, and in particular, the defender can gain significantly higher utility by considering the attacker can only conduct observations on partial targets.
引用
收藏
页码:1527 / 1528
页数:2
相关论文
共 50 条
  • [31] Exponential discounting in security games of timing
    Merlevede, Jonathan
    Johnson, Benjamin
    Grossklags, Jens
    Holvoet, Tom
    [J]. JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [32] Bayesian Security Games for Controlling Contagion
    Tsai, Jason
    Qian, Yundi
    Vorobeychik, Yevgeniy
    Kiekintveld, Christopher
    Tambe, Milind
    [J]. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 33 - 38
  • [33] Coordinating resources in Stackelberg Security Games
    Bucarey, Victor L.
    Casorran, Carlos
    Labbe, Martine
    Ordonez, Fernando
    Figueroa, Oscar
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (03) : 846 - 861
  • [34] A Security Case Study for Blockchain Games
    Min, Tian
    Cai, Wei
    [J]. 2019 IEEE GAMES, ENTERTAINMENT, MEDIA CONFERENCE (GEM), 2019,
  • [35] A Survey of Interdependent Information Security Games
    Laszka, Aron
    Felegyhazi, Mark
    Buttyan, Levente
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [36] Interdependent security games in a unidirectional network
    Rosenthal, Edward C.
    Trudeau, Christian
    [J]. RISK ANALYSIS, 2024, 44 (06) : 1430 - 1439
  • [37] Framework for Security in Online Video Games
    Pierre-Louis, Raymond M.
    [J]. PROCEEDINGS OF THE 48TH ANNUAL SOUTHEAST REGIONAL CONFERENCE (ACM SE 10), 2010, : 500 - 503
  • [38] Disappointment-Aversion in Security Games
    Wachter, Jasmin
    Rass, Stefan
    Koenig, Sandra
    Schauer, Stefan
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 314 - 325
  • [39] Effect of Security Investment on Evolutionary Games
    Zhang, Chen
    Pan, Rong
    Chaudhury, Abhijit
    Xu, Changxin
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (06) : 1695 - 1718
  • [40] Security issues in massive online games
    Hu, Jiankun
    Zambetta, Fabio
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 83 - 92