Abstract
In the previous two chapters, we have investigated dynamics security games with asymmetric information, in which the extra or the missing information is inherent to the underlying security problems. In this chapter, we switch the gear and further consider the possibility of proactively creating information asymmetry in security games for the defender’s benefit. Particularly, deception will be investigated as a concrete tool to achieve this objective. However, most existing deception techniques are designed for static scenarios. The objective of this chapter is to illustrate a foresighted deception framework that allows the defender to better align its deception strategy with its conventional defense strategy and the dynamics in the environment. In addition, a network protection game is taken as a concrete example to illustrate the advantage of the foresighted deception achieved by the SDG framework over the conventional myopic deception.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J.P. Hespanha, Y. Ateskan, H. Kizilocak, Deception in non-cooperative games with partial information, in DARPA-JFACC Symposium on Advances in Enterprise Control (2000)
D. Li, J.B. Cruz, Information, decision-making and deception in games. Decis. Support. Syst. 47(4), 518–527 (2009)
J. Zhuang, V.M. Bier, Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Def. Peace Econ. 22(1), 43–61 (2011)
J. Zhuang, V.M. Bier, O. Alagoz, Modeling secrecy and deception in a multiple-period attacker–defender signaling game. Eur. J. Oper. Res. 203(2), 409–418 (2010)
T.E. Carroll, D. Grosu, A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162–1172 (2011)
J. Pawlick, Q. Zhu, Deception by design: evidence-based signaling games for network defense (2015). arXiv preprint arXiv:1503.05458
H. Xu, Z. Rabinovich, S. Dughmi, M. Tambe, Exploring information asymmetry in two-stage security games, in Proceedings of AAAI (2015)
F. Cohen, D. Koike, Misleading attackers with deception, in Proceedings of IEEE SMC Information Assurance Workshop (2004)
H. Xu, A.X. Jiang, A. Sinha, Z. Rabinovich, S. Dughmi, M. Tambe, Security games with information leakage: modeling and computation (2015). arXiv preprint arXiv:1504.06058
T. Alpcan, T. BaÅŸar, Network Security: A Decision and Game-Theoretic Approach (Cambridge University Press, Cambridge, 2010)
X. He, M.M. Islam, R. Jin, H. Dai, Foresighted deception in dynamic security games, in 2017 IEEE International Conference on Communications (ICC), pp. 1–6
M.L. Littman, Markov games as a framework for multi-agent reinforcement learning, in Proceedings of ICML (1994)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
He, X., Dai, H. (2018). Dynamic Security Games with Deception. In: Dynamic Games for Network Security. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75871-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-75871-8_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75870-1
Online ISBN: 978-3-319-75871-8
eBook Packages: EngineeringEngineering (R0)