Multi-dimensional Network Security Game: How do attacker and defender battle on parallel targets?

02/20/2022
by   Yuedong Xu, et al.
0

In this paper, we consider a new network security game wherein an attacker and a defender are battling over "multiple" targets. This type of game is appropriate to model many current network security conflicts such as Internet phishing, mobile malware or network intrusions. In such attacks, the attacker and the defender need to decide how to allocate resources on each target so as to maximize his utility within his resource limit. We model such a multi-dimensional network security game as a constrained non-zero sum game. Two security breaching models, the product-form and the proportion-form, are considered. For each breaching model, we prove the existence of a unique Nash equilibrium (NE) based on Rosen's theorem and propose efficient algorithms to find the NE when the games are strictly concave. Furthermore, we show the existence of multiple NEs in the product-form breaching model when the strict concavity does not hold. Our study sheds light on the strategic behaviors of the attacker and the defender, in particular, on how they allocate resources to the targets which have different weights, and how their utilities as well as strategies are influenced by the resource constraints.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/19/2018

Facing Multiple Attacks in Adversarial Patrolling Games with Alarmed Targets

We focus on adversarial patrolling games on arbitrary graphs, where the ...
research
05/05/2018

Designing the Game to Play: Optimizing Payoff Structure in Security Games

Effective game-theoretic modeling of defender-attacker behavior is becom...
research
06/10/2023

The Defense of Networked Targets in General Lotto games

Ensuring the security of networked systems is a significant problem, con...
research
05/28/2015

Multidefender Security Games

Stackelberg security game models and associated computational tools have...
research
08/29/2018

Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems

In this paper, a novel anti-jamming mechanism is proposed to analyze and...
research
01/27/2022

Smart City Defense Game: Strategic Resource Management during Socio-Cyber-Physical Attacks

Ensuring public safety in a Smart City (SC) environment is a critical an...
research
04/25/2022

Strategic Signaling for Utility Control in Audit Games

As an effective method to protect the daily access to sensitive data aga...

Please sign up or login with your details

Forgot password? Click here to reset