【24h】

Security Games with Limited Surveillance

机译:监控有限的安全游戏

获取原文

摘要

Randomized first-mover strategies of Stackelberg games are used in several deployed applications to allocate limited resources for the protection of critical infrastructure. Stackelberg games model the fact that a strategic attacker can surveil and exploit the defender's strategy, and randomization guards against the worst effects by making the defender less predictable. In accordance with the standard game-theoretic model of Stackelberg games, past work has typically assumed that the attacker has perfect knowledge of the defender's randomized strategy and will react correspondingly. In light of the fact that surveillance is costly, risky, and delays an attack, this assumption is clearly simplistic: attackers will usually act on partial knowledge of the defender's strategies. The attacker's imperfect estimate could present opportunities and possibly also threats to a strategic defender. In this paper, we therefore begin a systematic study of security games with limited surveillance. We propose a natural model wherein an attacker forms or updates a belief based on observed actions, and chooses an optimal response. We investigate the model both theoretically and experimentally. In particular, we give mathematical programs to compute optimal attacker and defender strategies for a fixed observation duration, and show how to use them to estimate the attacker's observation durations. Our experimental results show that the defender can achieve significant improvement in expected utility by taking the attacker's limited surveillance into account, validating the motivation of our work.
机译:Stackelberg游戏的随机先发策略已用于多个已部署的应用程序中,以分配有限的资源来保护关键基础设施。 Stackelberg游戏模拟了战略攻击者可以监视并利用防御者的策略的事实,而随机化则通过降低防御者的可预测性来防范最坏的影响。根据Stackelberg游戏的标准游戏理论模型,过去的工作通常假定攻击者对防御者的随机策略具有完全的了解,并且会做出相应的反应。考虑到监视的成本高昂,风险大且会延迟攻击的事实,因此此假设显然过于简单:攻击者通常会根据防御者策略的部分知识采取行动。攻击者的不完美估计可能会给战略防御者带来机遇,也可能给他们带来威胁。因此,在本文中,我们开始对有限监视的安全游戏进行系统的研究。我们提出了一种自然模型,其中攻击者根据观察到的动作形成或更新信念,然后选择最佳响应。我们在理论上和实验上都研究了该模型。特别是,我们提供了数学程序来计算固定观察期的最佳攻击者和防御者策略,并展示了如何使用它们来估计攻击者的观察期。我们的实验结果表明,防御者可以通过考虑攻击者的有限监视来实现预期效用的显着提高,从而验证我们的工作动机。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号