Optimal Deceptive Strategies in Security Games: A Preliminary Study

نویسندگان

  • Yue Yin
  • Bo An
  • Yevgeniy Vorobeychik
  • Jun Zhuang
چکیده

Attacker-defender Stackelberg games have been used in several deployed applications of game theory for infrastructure security. Security resources of the defender are game-theoretically allocated to prevent a strategic attacker from using surveillance to learn and exploit patterns in the allocation. Existing work on security games assumes that the defender honestly displays her real security resources. We introduce a new model in which the defender may use deceptive resources (e.g., a mock camera in the part for deterring potential adversaries, or a hidden camera on the road for detecting overspeed) to mislead the attacker. We provide algorithms for computing the defender’s optimal strategy in consideration of deceptions. We also present experimental results evaluating the effectiveness of using deceptive strategies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Deception and Game Deterrence via Signaling Games

Maintenance and verification of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attacks, making use of replicated deceptive identities, represent a major challenge for the designers ...

متن کامل

Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach

Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...

متن کامل

Approximation Approaches for Solving Security Games with Surveillance Cost: A Preliminary Study

Security game models have been deployed to allocate limited security resources for critical infrastructure protection. Much work on this topic assumes that attackers have perfect knowledge of the defender’s randomized strategy. However, this assumption is not realistic, considering surveillance cost, since attackers may only have partial knowledge of the defender’s strategies, and may dynamical...

متن کامل

A satisfactory strategy of multiobjective two person matrix games with fuzzy payoffs

The multiobjective two person matrix game problem with fuzzy payoffs is considered in this paper. It is assumed that fuzzy payoffs are triangular fuzzy numbers. The problem is converted to several multiobjective matrix game problems with interval payoffs by using the $alpha$-cuts of fuzzy payoffs. By solving these problems some $alpha$-Pareto optimal strategies with some interval outcomes are o...

متن کامل

Minimum Support Size of the Defender’s Strong Stackelberg Equilibrium Strategies in Security Games

Stackelberg security games have been applied to address challenges in security resource allocation of realworld infrastructure protection tasks. The key to such an application is to efficiently compute the defender’s optimal strategy in consideration of the attacker’s surveillance capability and best response. Experimental results show that the defender’s optimal strategy often uses only a smal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013