Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets

@inproceedings{Hota2016OptimalAG,
  title={Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets},
  author={Ashish Ranjan Hota and Abraham A. Clements and Shreyas Sundaram and Saurabh Bagchi},
  booktitle={GameSec},
  year={2016}
}
We introduce a game-theoretic framework to compute optimal and strategic security investments by multiple defenders. Each defender is responsible for the security of multiple assets, with the interdependencies between the assets captured by an interdependency graph. We formulate the problem of computing the optimal defense allocation by a single defender as a convex optimization problem, and establish the existence of a pure Nash equilibrium of the game between multiple defenders. We apply our… 

A Network Monitoring Game with Heterogeneous Component Criticality Levels

TLDR
This work considers an attacker-operator game for monitoring a large–scale network that is comprised of components that differ in their criticality levels and uses a previously developed approach to obtain an approximate Nash equilibrium in the general case.

A Cyber-Security Investment Game for Networked Control Systems

TLDR
A general-sum, two-player, mixed strategy (MS) game, where the attacker attempts to destroy communication equipment of some nodes, and thereby render the LQR feedback gain matrix to be sparse, leading to degradation of closed-loop performance.

Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks

TLDR
This work analytically characterize Nash equilibria of this large-scale zero-sum game when every vulnerable network component can be monitored from a unique sensor location and designs a heuristic solution approach based on minimum set covers for computing inspection strategies in general.

Network Inspection from Locations with Imperfect Detection Capabilities

TLDR
This work analytically characterize Nash equilibria of this zero-sum game when the monitoring sets are mutually disjoint and shows how the criticality of network components jointly depends on both players’ resources, detection rates, and the network topology.

A game theoretic model of computer network exploitation campaigns

  • Robert MitchellB. Healy
  • Computer Science
    2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)
  • 2018
TLDR
A dynamic, asymmetric, complete-information, general-sum game to model CNE campaigns and techniques to estimate this game's parameters are proposed.

BASCPS: How does behavioral decision making impact the security of cyber-physical systems?

TLDR
It is shown that behavioral decision making leads to a suboptimal pattern of resource allocation compared to non-behavioral decision making, and that selfish defense decisions together with behavioral decisions significantly increase security risk.

Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems

TLDR
This work considers a security setting in which the CyberPhysical System (CPS) is composed of subnetworks where each subnetwork is under ownership of one defender and model such CPS using Hybrid Input-Output Automaton (HIOA) where eachSubnetwork is represented by a HIOA module.

Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems

We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared

On a Generic Security Game Model

TLDR
A game model which is generic enough to capture various modes of engagement/interactions between users and network administrators as games and the conditions for formulating the strategies when dealing with more than one attacker and making collaborations are presented.

A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid

TLDR
A novel Hybrid Attack Model (HAM) that combines Probabilistic Learning Attacker, Dynamic Defender, PLADD model and a Markov Chain model to simulate the planning and execution stages of a bad data injection attack in power grid is introduced.

References

SHOWING 1-10 OF 23 REFERENCES

Game Theory Meets Information Security Management

TLDR
A game theoretic model which optimally allocates cyber security resources such as administrators’ time across different tasks is proposed and it is proven that the defender’s Nash strategy is also minimax, and Singular Value Decomposition (SVD) is proposed as an efficient technique to compute approximate equilibria in games.

Approximate Solutions for Attack Graph Games with Imperfect Information

TLDR
This work model the problem of network security hardening as a general-sum extensive-form game with imperfect information and seeks a solution in the form of Stackelberg Equilibrium, and proposes a set of approximate solution methods.

A Survey of Interdependent Information Security Games

TLDR
This survey summarizes game-theoretic interdependence models, characterize the emerging security inefficiencies, and present mechanisms to improve the security decisions of the participants.

Optimal interdiction of attack plans

We present a Stackelberg game model of security in which the defender chooses a mitigation strategy that interdicts potential attack actions, and the attacker responds by computing an optimal attack

Computing Randomized Security Strategies in Networked Domains

TLDR
A novel framework for computing optimal randomized security policies in networked domains is introduced which extends previous linear programming techniques for Stackelberg security games to incorporate benefits and costs of arbitrary security configurations on individual assets and offers a principled model of failure cascades.

Multi-Agent Decentralized Network Interdiction Games

TLDR
This work establishes theoretical bounds on the worst-case efficiency loss of equilibria in DSPI games, with such loss caused by the lack of coordination among noncooperative interdictors, and uses the decentralized algorithms to empirically study the average- case efficiency loss.

Security scheduling for real-world networks

TLDR
Snares is presented, a novel algorithm that computes optimal solutions for both the defender and the attacker in such network security problems, based on a double-oracle framework and makes novel use of warm starts and greedy responses.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling

TLDR
This book is designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Security And Game Theory Algorithms Deployed Systems Lessons Learned

TLDR
Thank you very much for reading security and game theory algorithms deployed systems lessons learned, they will help people to enjoy a good book with a cup of tea in the afternoon instead of facing with some infectious virus inside their desktop computer.

Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games

IN [1] J. B. ROSEN GIVES a sufficient condition for the uniqueness of the equilibrium point of a game. The same condition is also sufficient for the stability of the equilibrium point given a