首页> 外文会议>International conference on decision and game theory for security >A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources
【24h】

A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources

机译:捍卫资源有限攻击卫生攻击的游戏理论模型

获取原文

摘要

Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental trade-offs involved. Previous works in this direction, however, mainly focus on the single-node case without considering strict resource constraints. In this paper, a game-theoretic model for protecting a system of multiple nodes against stealthy attacks is proposed. We consider the practical setting where the frequencies of both attack and defense are constrained by limited resources, and an asymmetric feedback structure where the attacker can fully observe the states of nodes while largely hiding its actions from the defender. We characterize the best response strategies for both attacker and defender, and study the Nash Equilibria of the game. We further study a sequential game where the defender first announces its strategy and the attacker then responds accordingly, and design an algorithm that finds a nearly optimal strategy for the defender to commit to.
机译:隐形攻击是对网络安全的重大威胁。在实践中,攻击者和捍卫者都有可能限制其能力的资源限制。因此,为了制定强劲的防御战略,有希望的方法是利用博弈论来了解所涉及的基本权衡。然而,以前的作品在此方向上主要关注单节点案例而不考虑严格的资源限制。本文提出了一种用于保护多个节点系统免受隐形攻击的游戏理论模型。我们考虑到攻击和防御的频率受限制的实际设置,受限资源限制,并且攻击者可以完全观察节点状态的不对称反馈结构,同时在很大程度上隐藏其从防御者的行动。我们描述了攻击者和后卫的最佳反应策略,并研究了比赛的纳什均衡。我们进一步研究了一个顺序游戏,后卫首先宣布其策略和攻击者,然后响应相应的响应,并设计一种找到近似最佳策略的算法来提交。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号