A generic scheme for cyber security in resource constraint network using incomplete information game

被引:0
|
作者
Moirangthem Tiken Singh
Surajit Borkotokey
Rachid Ait Maalem Lahcen
Ram N. Mohapatra
机构
[1] DUIET,Department of Computer Science and Engineering
[2] Dibrugarh University,Department of Mathematics
[3] Dibrugarh University,Department of Mathematics
[4] University of Central Florida,undefined
来源
Evolutionary Intelligence | 2023年 / 16卷
关键词
Limited rationality; Learning algorithm; Optimal strategy; State explosion problem; State-oriented stochastic Markov game; Stateless stochastic game;
D O I
暂无
中图分类号
学科分类号
摘要
We propose an online learning model that efficiently teaches a defender’s agent to learn the attacker’s behavior while interacting in the cyber-world. This paper models the interaction between these two agents as a stochastic game with limited rationality. Because of this limited rationality, the proposed model helps the defender’s agent learn the unknown communicator’s behavior from the feedback obtained while interacting with it. Many models are built to solve the interaction between them by developing a state-oriented stochastic Markov game. However, such models fail due to the state explosion problem, and therefore, this paper discusses a model to solve this game, restricting it to a stateless stochastic game. The model is then compared to check the performance with different algorithms that solve stochastic games. The comparison between them shows that the proposed algorithm converges to an optimal strategy in a brief simulation time span. Finally, our model checks the performance with an existing technique that shows that the proposed algorithm chooses the correct strategy for around 91% of the simulation time compared to 73% of the simulation time by the existing algorithm.
引用
收藏
页码:819 / 832
页数:13
相关论文
共 50 条
  • [31] Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game
    Hu, Hao
    Liu, Yuling
    Zhang, Hongqi
    Pan, Ruixuan
    IEEE ACCESS, 2018, 6 : 29806 - 29821
  • [32] Research on protection strategy of interdependent infrastructure network based on incomplete information game
    Li, Yulong
    Su, Hua
    Zhang, Chi
    Li, Huijia
    Lin, Jie
    Li, Guijun
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2022, 42 (04): : 1026 - 1042
  • [33] Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game
    Hu, Hao
    Liu, Yuling
    Chen, Chen
    Zhang, Hongqi
    Liu, Yi
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1683 - 1700
  • [34] Social Network Based Security Scheme in Mobile Information-Centric Network
    Lu, You
    Wang, Zhiyang
    Yu, Yu-Ting
    Fan, Ruolin
    Gerla, Mario
    2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 1 - 7
  • [35] Cyber Security Modeling for SCADA Systems Using Stochastic Game Nets Approach
    El Bouchti, Abdelali
    Nahhal, Tarik
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 42 - 47
  • [36] A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
    Liu, Xiao
    Xiong, Naixue
    Zhang, Ning
    Liu, Anfeng
    Shen, Hailan
    Huang, Changqin
    IEEE ACCESS, 2018, 6 : 3882 - 3898
  • [37] Protecting shared information in networks: A network security game with strategic attacks
    de Witte, Bram
    Frasca, Paolo
    Overvest, Bastiaan
    Timmer, Judith
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4255 - 4277
  • [38] Game Theoretic Resource Allocation for Multicell D2D Communications with Incomplete Information
    Huang, Jun
    Yin, Ying
    Sun, Yi
    Zhao, Yanxiao
    Xing, Cong-cong
    Duan, Qiang
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3039 - 3044
  • [39] Game of information security investment: Impact of attack types and network vulnerability
    Wu, Yong
    Feng, Gengzhong
    Wang, Nengmin
    Liang, Huigang
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (15-16) : 6132 - 6146
  • [40] Cyber Deception for Wireless Network Virtualization using Stackelberg Game Theory
    Adebayo, Abdulhamid A.
    Rawat, Danda B.
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,