Game Theory for Cyber Deception: A Tutorial

03/03/2019
by   Quanyan Zhu, et al.
0

Deceptive and anti-deceptive technologies have been developed for various specific applications. But there is a significant need for a general, holistic, and quantitative framework of deception. Game theory provides an ideal set of tools to develop such a framework of deception. In particular, game theory captures the strategic and self-interested nature of attackers and defenders in cybersecurity. Additionally, control theory can be used to quantify the physical impact of attack and defense strategies. In this tutorial, we present an overview of game-theoretic models and design mechanisms for deception and counter-deception. The tutorial aims to provide a taxonomy of deception and counter-deception and understand how they can be conceptualized, quantified, and designed or mitigated. This tutorial gives an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of cyberdeception. The tutorial will also discuss open problems and research challenges that the HoTSoS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory.

READ FULL TEXT

page 1

page 2

page 3

research
08/24/2018

Game Theory Meets Network Security: A Tutorial at ACM CCS

The increasingly pervasive connectivity of today's information systems b...
research
12/14/2017

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Cyber attacks on both databases and critical infrastructure have threate...
research
04/30/2019

Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

Abuse of zero-permission sensors on-board mobile and wearable devices to...
research
05/21/2019

SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies

Cryptocurrencies have garnered much attention in recent years, both from...
research
10/16/2019

Dynamic Games for Secure and Resilient Control System Design

Modern control systems are featured by their hierarchical structure comp...
research
09/07/2021

Defending a Perimeter from a Ground Intruder Using an Aerial Defender: Theory and Practice

The perimeter defense game has received interest in recent years as a va...
research
08/22/2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

Honeypots play a crucial role in implementing various cyber deception te...

Please sign up or login with your details

Forgot password? Click here to reset