【24h】

Security Games with Limited Surveillance

机译:安全游戏有限的监视

获取原文

摘要

Randomized first-mover strategies of Stackelberg games are used in several deployed applications to allocate limited resources for the protection of critical infrastructure. Stackelberg games model the fact that a strategic attacker can surveil and exploit the defender's strategy, and randomization guards against the worst effects by making the defender less predictable. In accordance with the standard game-theoretic model of Stackelberg games, past work has typically assumed that the attacker has perfect knowledge of the defender's randomized strategy and will react correspondingly. In light of the fact that surveillance is costly, risky, and delays an attack, this assumption is clearly simplistic: attackers will usually act on partial knowledge of the defender's strategies. The attacker's imperfect estimate could present opportunities and possibly also threats to a strategic defender. In this paper, we therefore begin a systematic study of security games with limited surveillance. We propose a natural model wherein an attacker forms or updates a belief based on observed actions, and chooses an optimal response. We investigate the model both theoretically and experimentally. In particular, we give mathematical programs to compute optimal attacker and defender strategies for a fixed observation duration, and show how to use them to estimate the attacker's observation durations. Our experimental results show that the defender can achieve significant improvement in expected utility by taking the attacker's limited surveillance into account, validating the motivation of our work.
机译:Accountized First-MOVER策略在几个部署的应用程序中使用了用于保护关键基础架构的有限资源。 Stackelberg游戏模型是战略攻击者可以监测和利用后卫的战略,并通过使捍卫者更少可预测来解决最严重的影响。根据Stackelberg游戏的标准游戏 - 理论模型,过去的工作通常假设攻击者对后卫的随机策略具有完全了解,并将相应地反应。鉴于监测昂贵,风险和延迟攻击的事实,这一假设显然是简单的:攻击者通常会根据后卫的策略的部分了解。攻击者的不完美估计可能会呈现机会,也可能威胁到战略后卫。在本文中,我们开始对安全游戏的系统研究有限的监视。我们提出了一种自然模型,其中攻击者根据观察到的行动表格或更新信仰,并选择最佳反应。我们在理论和实验上调查模型。特别是,我们提供数学程序来计算定期观察持续时间的最佳攻击者和后卫策略,并展示如何使用它们来估计攻击者的观察持续时间。我们的实验结果表明,防守者通过考虑攻击者的监视,验证了我们工作的动力,可以通过攻击者的有限监视来实现预期效用的显着改善。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号