Title :
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints
Author :
Ming Zhang ; Zizhan Zheng ; Shroff, Ness B.
Author_Institution :
Dept. of CSE, Ohio State Univ., Columbus, OH, USA
Abstract :
Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental tradeoffs involved. Previous works in this direction, however, mainly focus on the single-node case without considering strict resource constraints. In this paper, a game-theoretic model for protecting a system of multiple nodes against stealthy attacks is proposed. We consider the practical setting where the frequencies of both the attack and the defense are constrained by limited resources, and an asymmetric feedback structure where the attacker can fully observe the states of nodes while largely hiding its actions from the defender. We characterize best strategies for both the defender and the attacker, and study the Nash Equilibria of the game.
Keywords :
feedback; game theory; security of data; Nash equilibria; asymmetric feedback structure; cyber security; game theoretic model; observable defenses; single-node case; stealthy attacks; strict resource constraints; Computer security; Educational institutions; Games; Optimization; Resource management; Upper bound; Security games; stealthy attacks;
Conference_Titel :
Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
Conference_Location :
Atlanta, GA
DOI :
10.1109/GlobalSIP.2014.7032232