A generic scheme for cyber security in resource constraint network using incomplete information game

被引:0
|
作者
Moirangthem Tiken Singh
Surajit Borkotokey
Rachid Ait Maalem Lahcen
Ram N. Mohapatra
机构
[1] DUIET,Department of Computer Science and Engineering
[2] Dibrugarh University,Department of Mathematics
[3] Dibrugarh University,Department of Mathematics
[4] University of Central Florida,undefined
来源
Evolutionary Intelligence | 2023年 / 16卷
关键词
Limited rationality; Learning algorithm; Optimal strategy; State explosion problem; State-oriented stochastic Markov game; Stateless stochastic game;
D O I
暂无
中图分类号
学科分类号
摘要
We propose an online learning model that efficiently teaches a defender’s agent to learn the attacker’s behavior while interacting in the cyber-world. This paper models the interaction between these two agents as a stochastic game with limited rationality. Because of this limited rationality, the proposed model helps the defender’s agent learn the unknown communicator’s behavior from the feedback obtained while interacting with it. Many models are built to solve the interaction between them by developing a state-oriented stochastic Markov game. However, such models fail due to the state explosion problem, and therefore, this paper discusses a model to solve this game, restricting it to a stateless stochastic game. The model is then compared to check the performance with different algorithms that solve stochastic games. The comparison between them shows that the proposed algorithm converges to an optimal strategy in a brief simulation time span. Finally, our model checks the performance with an existing technique that shows that the proposed algorithm chooses the correct strategy for around 91% of the simulation time compared to 73% of the simulation time by the existing algorithm.
引用
收藏
页码:819 / 832
页数:13
相关论文
共 50 条
  • [41] Social cyber forensics: leveraging open source information and social network analysis to advance cyber security informatics
    Samer Al-khateeb
    Nitin Agarwal
    Computational and Mathematical Organization Theory, 2020, 26 : 412 - 430
  • [42] Social cyber forensics: leveraging open source information and social network analysis to advance cyber security informatics
    Al-khateeb, Samer
    Agarwal, Nitin
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2020, 26 (04) : 412 - 430
  • [43] Mobile Ad Hoc Network Security Using Mean Field Game Theoretic Threshold-Based Scheme
    Chopra K.
    Recent Advances in Computer Science and Communications, 2022, 15 (03) : 388 - 396
  • [44] A Novel Routing Scheme for Resource-Constraint Opportunistic Networks: A Cooperative Multiplayer Bargaining Game Approach
    Li, Li
    Qin, Yang
    Zhong, Xiaoxiong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6547 - 6561
  • [45] The Design of Enterprise Network Information Sharing Scheme Based on Security Technology
    Ji, Jun
    Xing, Fei-Fei
    Zang, Yu-Qing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 623 - 626
  • [46] SCIPS: A serious game using a guidance mechanic to scaffold effective training for cyber security
    O'Connor, Stuart
    Hasshu, Salim
    Bielby, James
    Colreavy-Donnelly, Simon
    Kuhn, Stefan
    Caraffini, Fabio
    Smith, Richard
    INFORMATION SCIENCES, 2021, 580 : 524 - 540
  • [47] Characterizing Network Behavior Features Using a Cyber-Security Ontology
    Ben-Asher, Noam
    Hutchinson, Steve
    Oltramari, Alessandro
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 758 - 763
  • [48] Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, : 455 - 462
  • [49] Using Bayesian networks to model the belief in the opponent in static game with incomplete information
    Wang, XF
    Liu, WY
    Li, J
    Zhao, Y
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 249 - 252
  • [50] Game-Based Resource Allocation Mechanism in B5G HetNets with Incomplete Information
    Feng, Weijia
    Li, Xiaohui
    APPLIED SCIENCES-BASEL, 2020, 10 (05):