A generic scheme for cyber security in resource constraint network using incomplete information game

被引:0
|
作者
Moirangthem Tiken Singh
Surajit Borkotokey
Rachid Ait Maalem Lahcen
Ram N. Mohapatra
机构
[1] DUIET,Department of Computer Science and Engineering
[2] Dibrugarh University,Department of Mathematics
[3] Dibrugarh University,Department of Mathematics
[4] University of Central Florida,undefined
来源
Evolutionary Intelligence | 2023年 / 16卷
关键词
Limited rationality; Learning algorithm; Optimal strategy; State explosion problem; State-oriented stochastic Markov game; Stateless stochastic game;
D O I
暂无
中图分类号
学科分类号
摘要
We propose an online learning model that efficiently teaches a defender’s agent to learn the attacker’s behavior while interacting in the cyber-world. This paper models the interaction between these two agents as a stochastic game with limited rationality. Because of this limited rationality, the proposed model helps the defender’s agent learn the unknown communicator’s behavior from the feedback obtained while interacting with it. Many models are built to solve the interaction between them by developing a state-oriented stochastic Markov game. However, such models fail due to the state explosion problem, and therefore, this paper discusses a model to solve this game, restricting it to a stateless stochastic game. The model is then compared to check the performance with different algorithms that solve stochastic games. The comparison between them shows that the proposed algorithm converges to an optimal strategy in a brief simulation time span. Finally, our model checks the performance with an existing technique that shows that the proposed algorithm chooses the correct strategy for around 91% of the simulation time compared to 73% of the simulation time by the existing algorithm.
引用
收藏
页码:819 / 832
页数:13
相关论文
共 50 条
  • [1] A generic scheme for cyber security in resource constraint network using incomplete information game
    Singh, Moirangthem Tiken
    Borkotokey, Surajit
    Lahcen, Rachid Ait Maalem
    Mohapatra, Ram N.
    EVOLUTIONARY INTELLIGENCE, 2023, 16 (03) : 819 - 832
  • [2] A Generic Cyber Defense Scheme Based on Stackelberg Game for Vehicular Network
    Sedjelmaci, Hichem
    Brahmi, Imane Horiya
    Boudguiga, Aymen
    Klaudel, Witold
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [3] A Stochastic Game Model with Imperfect Information in Cyber Security
    Shiva, Sajjan
    Roy, Sankardas
    Bedi, Harkeerat
    Dasgupta, Dipankar
    Wu, Qishi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 308 - 318
  • [4] Security Defence Policy Selection Method Using the Incomplete Information Game Model
    ZHANG Hengwei
    YU Dingkun
    WANG Jindong
    HAN Jihong
    WANG Na
    中国通信, 2015, 12(S2) (S2) : 123 - 131
  • [5] Security Defense Policy Selection Method Using the Incomplete Information Game Model
    Zhang Hengwei
    Yu Dingkun
    Wang Jindong
    Han Jihong
    Wang Na
    CHINA COMMUNICATIONS, 2015, 12 (02) : 123 - 131
  • [6] Security Defence Policy Selection Method Using the Incomplete Information Game Model
    ZHANG Hengwei
    YU Dingkun
    WANG Jindong
    HAN Jihong
    WANG Na
    China Communications, 2015, (S2) : 123 - 131
  • [7] MAGIC: Matching Game-Based Resource Allocation With Incomplete Information in Space Communication Network
    Mi, Xinru
    Song, Yanbo
    Yang, Chungang
    Han, Zhu
    Yuen, Chau
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (06) : 3481 - 3494
  • [8] Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game
    Liu, Xiaoxue
    Zhang, Jiexin
    Zhu, Peidong
    Tan, Qingping
    Yin, Wei
    COMPUTERS & SECURITY, 2021, 102
  • [9] Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach
    Sokri, Abderrahmane
    15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 283 - 288
  • [10] Cyber Security Using Arabic CAPTCHA Scheme
    Khan, Bilal
    Alghathbar, Khaled
    Khan, Muhammad Khurram
    Alkelabi, Abdullah
    Alajaji, Abdulaziz
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (01) : 76 - 84