TY - GEN
T1 - A Non-Zero Sum Bandwidth Scanning Game with a Sophisticated Adversary
AU - Garnaev, Andrey
AU - Trappe, Wade
N1 - Funding Information:
XI. ACKNOWLEDGEMENT This work was supported in part by the U.S. National Science Foundation under grants CNS-1909186 and ECCS-2128451.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Detecting malicious users (adversaries) or unlicensed activities is a crucial problem facing dynamic spectrum access. Traditionally, in such a problem, the adversary is considered to be one who wants to get achieve malicious goal undetected. In this paper we deal with a new type of adversary, called sophisticated adversary, who, besides the basic goal of being malicious and undetected, it also wants to achieve this in the most unpredictable way. As a metric for such unpredictability we consider the entropy of adversary strategy. We model this problem by a nonzero-sum two players resource allocation game. One of the players, called the Scanner, wants to detect the sophisticated adversary. The other player (adversary), called the Invader, wants to find a trade-off between two goals: to sneak bandwidth usage undetected and to achieve such sneaking in the most unpredictable way. The equilibrium is found in closed form, and its dependence on communication network parameters is illustrated. Finally, weighting coefficients for the basic and secondary goals of the Invader are optimized via Nash bargaining.
AB - Detecting malicious users (adversaries) or unlicensed activities is a crucial problem facing dynamic spectrum access. Traditionally, in such a problem, the adversary is considered to be one who wants to get achieve malicious goal undetected. In this paper we deal with a new type of adversary, called sophisticated adversary, who, besides the basic goal of being malicious and undetected, it also wants to achieve this in the most unpredictable way. As a metric for such unpredictability we consider the entropy of adversary strategy. We model this problem by a nonzero-sum two players resource allocation game. One of the players, called the Scanner, wants to detect the sophisticated adversary. The other player (adversary), called the Invader, wants to find a trade-off between two goals: to sneak bandwidth usage undetected and to achieve such sneaking in the most unpredictable way. The equilibrium is found in closed form, and its dependence on communication network parameters is illustrated. Finally, weighting coefficients for the basic and secondary goals of the Invader are optimized via Nash bargaining.
KW - Detection probability
KW - Entropy
KW - Nash bargaining
KW - Nash equilibrium
KW - Non-zero sum game
UR - http://www.scopus.com/inward/record.url?scp=85128713590&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85128713590&partnerID=8YFLogxK
U2 - 10.1109/CISS53076.2022.9751180
DO - 10.1109/CISS53076.2022.9751180
M3 - Conference contribution
AN - SCOPUS:85128713590
T3 - 2022 56th Annual Conference on Information Sciences and Systems, CISS 2022
SP - 72
EP - 77
BT - 2022 56th Annual Conference on Information Sciences and Systems, CISS 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 56th Annual Conference on Information Sciences and Systems, CISS 2022
Y2 - 9 March 2022 through 11 March 2022
ER -