Zero-Determinant Strategy in Stochastic Stackelberg Asymmetric Security Game

01/05/2023
by   Zhaoyang Cheng, et al.
0

In a stochastic Stackelberg asymmetric security game, the strong Stackelberg equilibrium (SSE) strategy is a popular option for the defender to get the highest utility against an attacker with the best response (BR) strategy. However, the attacker may be a boundedly rational player, who adopts a combination of the BR strategy and a fixed stubborn one. In such a condition, the SSE strategy may not maintain the defensive performance due to the stubborn element. In this paper, we focus on how the defender can adopt the unilateral-control zero-determinate (ZD) strategy to confront the boundedly rational attacker. At first, we verify the existence of ZD strategies for the defender. We then investigate the performance of the defender's ZD strategy against a boundedly rational attacker, with a comparison of the SSE strategy. Specifically, when the attacker's strategy is close to the BR strategy, the ZD strategy admits a bounded loss for the defender compared with the SSE strategy. Conversely, when the attacker's strategy is close to the stubborn strategy, the ZD strategy can bring higher defensive performance for the defender than the SSE strategy does.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/05/2020

Stochastic Stackelberg games

In this paper, we consider a discrete-time stochastic Stackelberg game w...
research
05/28/2019

Manipulating a Learning Defender and Ways to Counteract

In Stackelberg security games, information about the attacker's type (i....
research
06/06/2021

Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning

Smart grids are vulnerable to cyber-attacks. This paper proposes a game-...
research
04/25/2022

Strategic Signaling for Utility Control in Audit Games

As an effective method to protect the daily access to sensitive data aga...
research
03/24/2021

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler's asymptoti...
research
06/09/2020

On the Economics of Offline Password Cracking

We develop an economic model of an offline password cracker which allows...
research
07/06/2023

Pretty Good Strategies for Benaloh Challenge

Benaloh challenge allows the voter to audit the encryption of her vote, ...

Please sign up or login with your details

Forgot password? Click here to reset