• DocumentCode
    257895
  • Title

    Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints

  • Author

    Ming Zhang ; Zizhan Zheng ; Shroff, Ness B.

  • Author_Institution
    Dept. of CSE, Ohio State Univ., Columbus, OH, USA
  • fYear
    2014
  • fDate
    3-5 Dec. 2014
  • Firstpage
    813
  • Lastpage
    817
  • Abstract
    Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental tradeoffs involved. Previous works in this direction, however, mainly focus on the single-node case without considering strict resource constraints. In this paper, a game-theoretic model for protecting a system of multiple nodes against stealthy attacks is proposed. We consider the practical setting where the frequencies of both the attack and the defense are constrained by limited resources, and an asymmetric feedback structure where the attacker can fully observe the states of nodes while largely hiding its actions from the defender. We characterize best strategies for both the defender and the attacker, and study the Nash Equilibria of the game.
  • Keywords
    feedback; game theory; security of data; Nash equilibria; asymmetric feedback structure; cyber security; game theoretic model; observable defenses; single-node case; stealthy attacks; strict resource constraints; Computer security; Educational institutions; Games; Optimization; Resource management; Upper bound; Security games; stealthy attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
  • Conference_Location
    Atlanta, GA
  • Type

    conf

  • DOI
    10.1109/GlobalSIP.2014.7032232
  • Filename
    7032232