Skip to main content

Dynamic Security Games with Deception

  • Chapter
  • First Online:
Dynamic Games for Network Security

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

In the previous two chapters, we have investigated dynamics security games with asymmetric information, in which the extra or the missing information is inherent to the underlying security problems. In this chapter, we switch the gear and further consider the possibility of proactively creating information asymmetry in security games for the defender’s benefit. Particularly, deception will be investigated as a concrete tool to achieve this objective. However, most existing deception techniques are designed for static scenarios. The objective of this chapter is to illustrate a foresighted deception framework that allows the defender to better align its deception strategy with its conventional defense strategy and the dynamics in the environment. In addition, a network protection game is taken as a concrete example to illustrate the advantage of the foresighted deception achieved by the SDG framework over the conventional myopic deception.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J.P. Hespanha, Y. Ateskan, H. Kizilocak, Deception in non-cooperative games with partial information, in DARPA-JFACC Symposium on Advances in Enterprise Control (2000)

    Google Scholar 

  2. D. Li, J.B. Cruz, Information, decision-making and deception in games. Decis. Support. Syst. 47(4), 518–527 (2009)

    Article  Google Scholar 

  3. J. Zhuang, V.M. Bier, Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Def. Peace Econ. 22(1), 43–61 (2011)

    Article  Google Scholar 

  4. J. Zhuang, V.M. Bier, O. Alagoz, Modeling secrecy and deception in a multiple-period attacker–defender signaling game. Eur. J. Oper. Res. 203(2), 409–418 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  5. T.E. Carroll, D. Grosu, A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162–1172 (2011)

    Article  Google Scholar 

  6. J. Pawlick, Q. Zhu, Deception by design: evidence-based signaling games for network defense (2015). arXiv preprint arXiv:1503.05458

    Google Scholar 

  7. H. Xu, Z. Rabinovich, S. Dughmi, M. Tambe, Exploring information asymmetry in two-stage security games, in Proceedings of AAAI (2015)

    Google Scholar 

  8. F. Cohen, D. Koike, Misleading attackers with deception, in Proceedings of IEEE SMC Information Assurance Workshop (2004)

    Google Scholar 

  9. H. Xu, A.X. Jiang, A. Sinha, Z. Rabinovich, S. Dughmi, M. Tambe, Security games with information leakage: modeling and computation (2015). arXiv preprint arXiv:1504.06058

    Google Scholar 

  10. T. Alpcan, T. BaÅŸar, Network Security: A Decision and Game-Theoretic Approach (Cambridge University Press, Cambridge, 2010)

    Book  MATH  Google Scholar 

  11. X. He, M.M. Islam, R. Jin, H. Dai, Foresighted deception in dynamic security games, in 2017 IEEE International Conference on Communications (ICC), pp. 1–6

    Google Scholar 

  12. M.L. Littman, Markov games as a framework for multi-agent reinforcement learning, in Proceedings of ICML (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

He, X., Dai, H. (2018). Dynamic Security Games with Deception. In: Dynamic Games for Network Security. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-75871-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75871-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75870-1

  • Online ISBN: 978-3-319-75871-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics