DocumentCode
717188
Title
A game-theoretic model for defending against malicious users in RecDroid
Author
Rashidi, Bahman ; Fung, Carol
Author_Institution
Dept. of Comput. Sci., Virginia Commonwealth Univ., Richmond, VA, USA
fYear
2015
fDate
11-15 May 2015
Firstpage
1339
Lastpage
1344
Abstract
RecDroid is a smartphone permission response recommendation system which utilizes the responses from expert users in the network to help inexperienced users. However, in such system, malicious users can mislead the recommendation system by providing untruthful responses. Although detection system can be deployed to detect the malicious users, and exclude them from recommendation system, there are still undetected malicious users that may cause damage to RecDroid. Therefore, relying on environment knowledge to detect the malicious users is not sufficient. In this work, we present a game-theoretic model to analyze the interaction (request/response) between RecDroid users and RecDroid system using a static Bayesian game formulation. In the game RecDroid system chooses the best response strategy to minimize its loss from malicious users. We analyze the game model and explain the Nash equilibrium in a static scenario under different conditions. Through the static game model we discuss the strategy that RecDroid can adopt to disincentivize attackers in the system, so that attackers are discouraged to perform malicious users attack. Finally, we discuss several game parameters and their impact on players´ outcome.
Keywords
game theory; recommender systems; smart phones; user interfaces; RecDroid; game-theoretic model; malicious users; smartphone permission response recommendation system; Analytical models; Bayes methods; Conferences; Games; Mobile communication; Nash equilibrium; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on
Conference_Location
Ottawa, ON
Type
conf
DOI
10.1109/INM.2015.7140492
Filename
7140492
Link To Document