A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources

被引:29
|
作者
Zhang, Ming [1 ]
Zheng, Zizhan [2 ]
Shroff, Ness B. [1 ]
机构
[1] Ohio State Univ, Dept ECE & CSE, Columbus, OH 43210 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
Stealthy attacks; Resource constraints; Game theory;
D O I
10.1007/978-3-319-25594-1_6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental trade-offs involved. Previous works in this direction, however, mainly focus on the single-node case without considering strict resource constraints. In this paper, a game-theoretic model for protecting a system of multiple nodes against stealthy attacks is proposed. We consider the practical setting where the frequencies of both attack and defense are constrained by limited resources, and an asymmetric feedback structure where the attacker can fully observe the states of nodes while largely hiding its actions from the defender. We characterize the best response strategies for both attacker and defender, and study the Nash Equilibria of the game. We further study a sequential game where the defender first announces its strategy and the attacker then responds accordingly, and design an algorithm that finds a nearly optimal strategy for the defender to commit to.
引用
收藏
页码:93 / 112
页数:20
相关论文
共 50 条
  • [1] Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1665 - 1677
  • [2] Defending against terrorist attacks with limited resources
    Powell, Robert
    AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (03) : 527 - 541
  • [3] Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems
    Tian, Wen
    Ji, Xiao-Peng
    Liu, Weiwei
    Zhai, Jiangtao
    Liu, Guangjie
    Dai, Yuewei
    Huang, Shuhua
    ETRI JOURNAL, 2019, 41 (05) : 585 - 598
  • [4] Game Theoretic Defense Approach to Wireless Networks Against Stealthy Decoy Attacks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 816 - 821
  • [5] Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback
    Feng, Xiaotao
    Zheng, Zizhan
    Cansever, Derya
    Swami, Ananthram
    Mohapatra, Prasant
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 277 - 282
  • [6] A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks
    Cunningham, James D.
    Aved, Alexander
    Ferris, David
    Morrone, Philip
    Tucker, Conrad S.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1188 - 1197
  • [7] Stealthy Attacks and Observable Defenses: A Game Theoretic Model Under Strict Resource Constraints
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2014, : 813 - 817
  • [8] Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 252 - 258
  • [9] A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
    Rashidi, Bahman
    Fung, Carol
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1339 - 1344
  • [10] Towards a Game Theoretic Approach For Defending Against Crime Diffusion
    Zhang, Chao
    Jiang, Albert Xin
    Short, Martin B.
    Brantingham, P. Jeffrey
    Tambe, Milind
    AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2014, : 1355 - 1356