The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games

02/27/2022
by   Thanh H. Nguyen, et al.
0

This paper studies the problem of multi-step manipulative attacks in Stackelberg security games, in which a clever attacker attempts to orchestrate its attacks over multiple time steps to mislead the defender's learning of the attacker's behavior. This attack manipulation eventually influences the defender's patrol strategy towards the attacker's benefit. Previous work along this line of research only focuses on one-shot games in which the defender learns the attacker's behavior and then designs a corresponding strategy only once. Our work, on the other hand, investigates the long-term impact of the attacker's manipulation in which current attack and defense choices of players determine the future learning and patrol planning of the defender. This paper has three key contributions. First, we introduce a new multi-step manipulative attack game model that captures the impact of sequential manipulative attacks carried out by the attacker over the entire time horizon. Second, we propose a new algorithm to compute an optimal manipulative attack plan for the attacker, which tackles the challenge of multiple connected optimization components involved in the computation across multiple time steps. Finally, we present extensive experimental results on the impact of such misleading attacks, showing a significant benefit for the attacker and loss for the defender.

READ FULL TEXT
research
01/06/2019

Toward a Theory of Cyber Attacks

We provide a general methodology for analyzing defender-attacker based "...
research
09/23/2018

Security Diffusion Games

An increasing attention has been recently paid to studying the confronta...
research
01/27/2020

Behavior Associations in Lone-Actor Terrorists

Terrorist attacks carried out by individuals or single cells have signif...
research
05/28/2019

A Parameterized Perspective on Protecting Elections

We study the parameterized complexity of the optimal defense and optimal...
research
08/29/2020

Off-Path TCP Exploits of the Mixed IPID Assignment

In this paper, we uncover a new off-path TCP hijacking attack that can b...
research
06/08/2018

Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies

Crypto-currencies are digital assets designed to work as a medium of exc...
research
05/02/2021

Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation

In recent years, we have witnessed a new kind of DDoS attack, the burst ...

Please sign up or login with your details

Forgot password? Click here to reset