Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation

02/08/2019
by   Tao Zhang, et al.
0

Deception is a technique to mislead human or computer systems by manipulating beliefs and information. For the applications of cyber deception, non-cooperative games become a natural choice of models to capture the adversarial interactions between the players and quantitatively characterizes the conflicting incentives and strategic responses. In this chapter, we provide an overview of deception games in three different environments and extend the baseline signaling game models to include evidence through side-channel knowledge acquisition to capture the information asymmetry, dynamics, and strategic behaviors of deception. We analyze the deception in binary information space based on a signaling game framework with a detector that gives off probabilistic evidence of the deception when the sender acts deceptively. We then focus on a class of continuous one-dimensional information space and take into account the cost of deception in the signaling game. We finally explore the multi-stage incomplete-information Bayesian game model for defensive deception for advanced persistent threats (APTs). We use the perfect Bayesian Nash equilibrium (PBNE) as the solution concept for the deception games and analyze the strategic equilibrium behaviors for both the deceivers and the deceivees.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/01/2018

A Game-Theoretic Foundation of Deception: Knowledge Acquisition and Fundamental Limits

Deception is a technique to mislead human or computer systems by manipul...
research
09/06/2018

Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception

Security challenges accompany the efficiency. The pervasive integration ...
research
05/01/2018

iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things

The cloud-enabled Internet of controlled things (IoCT) envisions a netwo...
research
05/15/2018

Strategic analysis of implementation assets and threats

The aim of the strategic analysis is to (simply) carry out the game betw...
research
06/08/2021

Solving Structured Hierarchical Games Using Differential Backward Induction

Many real-world systems possess a hierarchical structure where a strateg...
research
09/06/2018

Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks

Advanced Persistent Threats (APTs) have created new security challenges ...
research
05/30/2023

A Game of Competition for Risk

In this study, we present models where participants strategically select...

Please sign up or login with your details

Forgot password? Click here to reset