首页> 外文会议>European Conference on Artificial Intelligence;Conference on Prestigious Applications of Intelligent Systems >Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception
【24h】

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception

机译:解码模仿安全游戏:处理攻击者模仿行为欺骗

获取原文

摘要

Real-world security problems are generally characterized by uncertainty about attackers' preferences, behavior, or other characteristics. To handle such uncertainties, security agencies (defender) typically rely on historical attack data to build a behavior model of the attacker, and incorporate this model into generating an effective defense strategy. For example, in wildlife protection, rangers can collect poaching signs (e.g., snares) to learn the behavior of poachers. However, in the real-world, a clever attacker can manipulate its attacks to fool the learning algorithm of the defender towards its own benefit. Unfortunately, existing state-of-the-art algorithms for generating defense strategies are not equipped to handle such deceptive behavior by the attacker, and this could lead to arbitrary losses for the defender. To address these challenges, this paper investigates a basic deception strategy of the attacker, termed imitative behavior deception, in which the attacker intentionally pretends to follow a specific behavior model and consistently plays according to that model, in order to optimize its utility. We have three main contributions. First, built upon previous work on attacker-behavior modeling, we introduce new algorithms to compute an optimal imitative behavior deception strategy of the attacker. Second, we propose a novel gametheoretic counter-deception algorithm which determines effective defense strategies, taking into account the deceptive behavior of the attacker. Third, we conduct extensive experiments, which shows that under the attacker's deception, the defender accrues a significant loss whereas the attacker achieves a significant gain in utility. Our experimental results also demonstrate the impact of our counter-deception algorithm on substantially diminishing the attacker's deception.
机译:现实世界的安全问题通常是对攻击者偏好,行为或其他特征的不确定性的特征。为了处理此类不确定性,安全机构(Defender)通常依赖于历史攻击数据来构建攻击者的行为模型,并将此模型纳入生成有效的防御策略。例如,在野生动物保护中,游侠可以收集偷猎标志(例如,咆哮)来学习偷猎者的行为。然而,在真实世界中,一个聪明的攻击者可以操纵它的攻击,以欺骗后卫的学习算法,以实现自己的利益。遗憾的是,用于产生防御策略的现有最先进的算法并不能通过攻击者处理这种欺骗行为,这可能导致后卫的任意损失。为了解决这些挑战,本文调查了攻击者的基本欺骗策略,被称为模仿行为欺骗,其中攻击者故意假装遵循特定的行为模型,并始终如一地播放根据该模型,以优化其实用程序。我们有三个主要贡献。首先,建立在以前的攻击者行为建模上的工作,我们介绍了新的算法来计算攻击者的最佳模仿行为欺骗策略。其次,我们提出了一种新颖的Gametheoric反欺骗算法,决定了有效的防御策略,考虑到攻击者的欺骗行为。第三,我们进行了广泛的实验,表明,根据攻击者的欺骗,后卫会累积显着损失,而攻击者则实现了实用的显着收益。我们的实验结果还展示了我们的反欺骗算法在大大减少攻击者的欺骗方面的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号