A Two-Stage Deception Game for Network Defense

被引:4
|
作者
Wang, Wei [1 ]
Zeng, Bo [1 ]
机构
[1] Univ Pittsburgh, Pittsburgh, PA 15260 USA
关键词
Two-stage security game; Game theory; Cyber security; Network security; Deception;
D O I
10.1007/978-3-030-01554-1_33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computer network is always under the threat of adversaries. Before launching any real attacks, adversaries may scan and probe the systems to gain some key information. In this paper, we build a two-stage deception game to determine how to answer attackers' scan and probe queries to minimize defender's expected loss. To achieve optimal defense strategy, a sophisticated mixed integer program is formulated. To support fast computation in reality, a two-stage heuristic method is also developed based on the problem's structural properties. Computational experiment shows that after scanning the whole network, adversary's probe against some hosts and how such probe is responded have significant influences on defender's expected loss. Our heuristic method is able to produce high quality solutions with a drastically improved computational performance.
引用
收藏
页码:569 / 582
页数:14
相关论文
共 50 条
  • [1] A two-stage network interdiction-monitoring game
    Nguyen, Di H. H.
    Song, Yongjia
    Smith, J. Cole
    NETWORKS, 2023, 81 (03) : 334 - 358
  • [2] A bargaining game model for measuring performance of two-stage network structures
    Du, Juan
    Liang, Liang
    Chen, Yao
    Cook, Wade D.
    Zhu, Joe
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2011, 210 (02) : 390 - 397
  • [3] Two-Stage Network Formation Game with Heterogeneous Players and Private Information
    Sun, Ping
    Parilina, Elena
    CONTRIBUTIONS TO GAME THEORY AND MANAGEMENT, VOL XII, 2019, 12 : 316 - 324
  • [4] COMMUNICATION AND COORDINATION IN A TWO-STAGE GAME
    Bjedov, Tjasa
    Madies, Thierry
    Villeval, Marie Claire
    ECONOMIC INQUIRY, 2016, 54 (03) : 1519 - 1540
  • [5] Two-Stage Game Guidance Strategy With Impact Point for Active Defense Aircraft in Two-on-Two Engagement
    Wang, Xintao
    Yang, Ming
    Wang, Songyan
    Chao, Tao
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2025, 61 (01) : 710 - 729
  • [6] Research on active defense based on multi-stage cyber deception game
    Hu, Yongjin
    Ma, Jun
    Guo, Yuanbo
    Zhang, Han
    Tongxin Xuebao/Journal on Communications, 2020, 41 (08): : 32 - 42
  • [7] Two-stage network games
    L. A. Petrosyan
    A. A. Sedakov
    A. O. Bochkarev
    Automation and Remote Control, 2016, 77 : 1855 - 1866
  • [8] Two-stage network games
    Petrosyan, L. A.
    Sedakov, A. A.
    Bochkarev, A. O.
    AUTOMATION AND REMOTE CONTROL, 2016, 77 (10) : 1855 - 1866
  • [9] A two-stage Bertrand-Edgeworth game
    Tasnádi, A
    ECONOMICS LETTERS, 1999, 65 (03) : 353 - 358
  • [10] A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion
    Gao, Chungang
    Wang, Yongjie
    Xiong, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022