首页> 外文学位 >Game-Theoretic Models for Interdependent Security: Modeling, Computing, and Learning.
【24h】

Game-Theoretic Models for Interdependent Security: Modeling, Computing, and Learning.

机译:相互依赖安全性的博弈模型:建模,计算和学习。

获取原文
获取原文并翻译 | 示例

摘要

Due to an increase number of attacks by hackers and terrorists, there has been quite a bit of recent research activity in the general area of game-theoretic models for terrorism settings that aim to understand the behavior of the attackers and the attackers' targets. My thesis is centered on introducing, studying, and applying several game-theoretic models to security.;In particular, my doctoral thesis consists of the following components: (1) designing increasingly more realistic variants of defense games; (2) studying computational questions in defense games such as equilibria computation and computational implications of equilibria characterizations, (3) designing efficient algorithms and effective heuristics for defense problems; and (4) designing and applying new machine learning techniques to estimate game model parameters from behavioral data.;Our computational models build on top of interdependent security (IDS) games, a model introduced by economists and risk-assessment experts Kunreuther and Heal to study investment decisions of strategic agents when facing direct and transfer risk exposure from other agents in the system. We first introduce generalized IDS (alpha-IDS) games, a model that extends IDS games where full investment can reduce transfer risk. In particular, alpha is a vector of probabilities, one for each agent, specifying the probability that the transfer risk will not be protected by the investment. In other words, agent i's investment can reduce indirect risk by probability (1 -- alphai). We then extend from alpha-IDS games and introduce interdependent defense (IDD) games, a computational-game-theoretic framework for settings of interdependent security to study scenarios of multiple-defenders vs. a single-attacker in a network. For the variants of defense games we introduced, we study some computational aspects of computing Nash equilibria in those games.;Finally, we investigate the problem of learning the games form observed behavioral data. For this problem, we introduce a machine-learning generative model to learn the parameters of the games. As an application, we apply the learning model and use machine-learning techniques to estimate the parameters and structure of alpha-IDS games using the vaccination data from the Centers for Disease Control and Prevention (CDC) in the United States.
机译:由于黑客和恐怖分子发动的攻击数量增加,最近在针对恐怖主义设置的博弈论模型的一般领域中进行了大量研究活动,旨在了解攻击者的行为和攻击者的目标。我的论文集中在介绍,研究和应用几种博弈论模型来实现安全性;特别是,我的博士学位论文包括以下组成部分:(1)设计越来越逼真的防御游戏变体; (2)研究防御博弈中的计算问题,例如平衡计算和平衡特征描述的计算含义,(3)设计有效的算法和有效的启发式防御问题; (4)设计和应用新的机器学习技术以从行为数据估计游戏模型参数。;我们的计算模型建立在相互依赖的安全(IDS)游戏的基础上,该模型由经济学家和风险评估专家Kunreuther和Heal引入进行研究当面对系统中其他代理商的直接风险和转移风险时,战略代理商的投资决策。我们首先介绍广义IDS(alpha-IDS)游戏,该模型扩展了IDS游戏,在该模型中,全额投资可以降低转移风险。尤其是,alpha是概率的矢量,每个代理商一个,规定了转移风险不受投资保护的概率。换句话说,代理i的投资可以通过概率(1- alphai)降低间接风险。然后,我们从alpha-IDS游戏扩展而来,并介绍了相互依存防御(IDD)游戏,这是一种用于计算相互依存安全性的计算游戏理论框架,用于研究网络中多防御者与单攻击者的场景。对于引入的防御游戏的变体,我们研究了这些游戏中计算纳什均衡的一些计算方面。最后,我们研究了从观察到的行为数据学习游戏的问题。针对此问题,我们引入了一种机器学习生成模型来学习游戏的参数。作为应用,我们使用学习模型并使用机器学习技术,使用来自美国疾病控制与预防中心(CDC)的疫苗接种数据来估算alpha-IDS游戏的参数和结构。

著录项

  • 作者

    Chan, Hau.;

  • 作者单位

    State University of New York at Stony Brook.;

  • 授予单位 State University of New York at Stony Brook.;
  • 学科 Computer science.;Economics.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 154 p.
  • 总页数 154
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号