Detection Games Under Fully Active Adversaries

02/08/2018
by   Benedetta Tondi, et al.
0

We study a binary hypothesis testing problem in which a defender must decide whether or not a test sequence has been drawn from a given memoryless source P_0 whereas, an attacker strives to impede the correct detection. With respect to previous works, the adversarial setup addressed in this paper considers an attacker who is active under both hypotheses, namely, a fully active attacker, as opposed to a partially active attacker who is active under one hypothesis only. In the fully active setup, the attacker distorts sequences drawn both from P_0 and from an alternative memoryless source P_1, up to a certain distortion level, which is possibly different under the two hypotheses, in order to maximize the confusion in distinguishing between the two sources, i.e., to induce both false positive and false negative errors at the detector, also referred to as the defender. We model the defender-attacker interaction as a game and study two versions of this game, the Neyman-Pearson game and the Bayesian game. Our main result is in the characterization of an attack strategy that is asymptotically both dominant (i.e., optimal no matter what the defender's strategy is) and universal, i.e., independent of P_0 and P_1. From the analysis of the equilibrium payoff, we also derive the best achievable performance of the defender, by relaxing the requirement on the exponential decay rate of the false positive error probability in the Neyman--Pearson setup and the tradeoff between the error exponents in the Bayesian setup. Such analysis permits to characterize the conditions for the distinguishability of the two sources given the distortion levels.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2017

Adversarial Source Identification Game with Corrupted Training

We study a variant of the source identification game with training data ...
research
10/26/2022

Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment

Identifying the actual adversarial threat against a system vulnerability...
research
05/29/2018

An exact solution for choosing the largest measurement from a sample drawn from an uniform distribution

In "Recognizing the Maximum of a Sequence", Gilbert and Mosteller analyz...
research
10/08/2018

Distributed Hypothesis Testing with Collaborative Detection

A detection system with a single sensor and two detectors is considered,...
research
09/28/2019

Nonzero-sum Adversarial Hypothesis Testing Games

We study nonzero-sum hypothesis testing games that arise in the context ...
research
12/08/2022

Simulation of Attacker Defender Interaction in a Noisy Security Game

In the cybersecurity setting, defenders are often at the mercy of their ...
research
10/21/2010

On the Foundations of Adversarial Single-Class Classification

Motivated by authentication, intrusion and spam detection applications w...

Please sign up or login with your details

Forgot password? Click here to reset