Security Diffusion Games

09/23/2018
by   Marcin Waniek, et al.
0

An increasing attention has been recently paid to studying the confrontation between a defender of a network and an aggressor who attacks selected targets and spreads the attack through the network in an infection-like manner. While to date the literature focused on the scenarios in which such spread follows a chance mechanism, in this paper we propose and analyze the first defender-attacker model in which the attacker is able to strategically guide the whole course of the attack spread. We find that even if the attacker knows the distribution of security resources chosen by the defender, finding an optimal plan of attack is NP-hard in a general case. However, we show that it is possible to efficiently find optimal strategies of the attacker and the defender for some simple network structures, such as cliques, stars, and trees. For more sophisticated network structures, we propose near-optimal strategies for both players.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/26/2022

Mixed Strategies for Security Games with General Defending Requirements

The Stackelberg security game is played between a defender and an attack...
research
02/27/2022

The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games

This paper studies the problem of multi-step manipulative attacks in Sta...
research
01/06/2019

Toward a Theory of Cyber Attacks

We provide a general methodology for analyzing defender-attacker based "...
research
12/02/2020

Defending against Contagious Attacks on a Network with Resource Reallocation

In classic network security games, the defender distributes defending re...
research
01/03/2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

This paper investigates the problem of synthesizing proactive defense sy...
research
06/10/2023

The Defense of Networked Targets in General Lotto games

Ensuring the security of networked systems is a significant problem, con...
research
02/02/2022

Minimizing Expected Intrusion Detection Time in Adversarial Patrolling

In adversarial patrolling games, a mobile Defender strives to discover i...

Please sign up or login with your details

Forgot password? Click here to reset