A Game Theoretical vulnerability analysis of Adversarial Attack

10/13/2022
by   Khondker Fariha Hossain, et al.
0

In recent times deep learning has been widely used for automating various security tasks in Cyber Domains. However, adversaries manipulate data in many situations and diminish the deployed deep learning model's accuracy. One notable example is fooling CAPTCHA data to access the CAPTCHA-based Classifier leading to the critical system being vulnerable to cybersecurity attacks. To alleviate this, we propose a computational framework of game theory to analyze the CAPTCHA-based Classifier's vulnerability, strategy, and outcomes by forming a simultaneous two-player game. We apply the Fast Gradient Symbol Method (FGSM) and One Pixel Attack on CAPTCHA Data to imitate real-life scenarios of possible cyber-attack. Subsequently, to interpret this scenario from a Game theoretical perspective, we represent the interaction in the Stackelberg Game in Kuhn tree to study players' possible behaviors and actions by applying our Classifier's actual predicted values. Thus, we interpret potential attacks in deep learning applications while representing viable defense strategies in the game theory prospect.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/12/2021

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

The increasing prevalence of security attacks on software-intensive syst...
research
07/05/2020

Adversarial Learning in the Cyber Security Domain

In recent years, machine learning algorithms, and more specially, deep l...
research
03/10/2023

The Critical Node Game

Cloud networks are the backbone of the modern distributed internet infra...
research
06/26/2023

Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games

Cyber-physical microgrids are vulnerable to rootkit attacks that manipul...
research
05/04/2023

A Serious Game for Simulating Cyberattacks to Teach Cybersecurity

With the rising number of cyberattacks, such as ransomware attacks and c...
research
07/16/2020

Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome

Each strategy has a foundation, an overarching way of explaining why thi...
research
10/17/2017

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

Phishing is an especially challenging cyber security threat as it does n...

Please sign up or login with your details

Forgot password? Click here to reset