首页> 外文会议>International conference on decision and game theory for security >A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources
【24h】

A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources

机译:有限资源防御隐身攻击的博弈模型

获取原文

摘要

Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental trade-offs involved. Previous works in this direction, however, mainly focus on the single-node case without considering strict resource constraints. In this paper, a game-theoretic model for protecting a system of multiple nodes against stealthy attacks is proposed. We consider the practical setting where the frequencies of both attack and defense are constrained by limited resources, and an asymmetric feedback structure where the attacker can fully observe the states of nodes while largely hiding its actions from the defender. We characterize the best response strategies for both attacker and defender, and study the Nash Equilibria of the game. We further study a sequential game where the defender first announces its strategy and the attacker then responds accordingly, and design an algorithm that finds a nearly optimal strategy for the defender to commit to.
机译:隐身攻击是对网络安全的主要威胁。实际上,攻击者和防御者都具有资源限制,这可能会限制其能力。因此,要发展鲁棒的防御策略,一种有前途的方法是利用博弈论来理解所涉及的基本权衡。但是,先前在这个方向上的工作主要集中在单节点情况下,而没有考虑严格的资源约束。在本文中,提出了一种保护多个节点的系统免受秘密攻击的博弈模型。我们考虑了在实际环境中,攻击和防御的频率都受到有限资源的限制,以及不对称的反馈结构,在这种结构中,攻击者可以完全观察节点的状态,而在很大程度上将防御者的行为隐藏了下来。我们为攻击者和防御者描绘了最佳响应策略,并研究了游戏的纳什均衡。我们进一步研究了顺序游戏,在该游戏中,防御者首先宣布其策略,然后攻击者做出相应的响应,并设计了一种算法,该算法找到了防御者要遵循的最佳策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号