Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This paper considers network protection games for a heterogeneous network system with N nodes against cyber-attackers of two different types of intentions. The first type tries to maximize damage based on the value of each net-worked node, while the second type only aims at successful infiltration. A defender, by applying defensive resources to networked nodes, can decrease those nodes' vulnerabilities. Meanwhile, the defender needs to balance the cost of using defensive resources and potential security benefits. Existing literature shows that, in a Nash equilibrium, the defender should adopt different resource allocation strategies against different types of attackers. However, it could be difficult for the defender to know the type of incoming cyber-attackers. A Bayesian game is investigated considering the case that the defender is uncertain about the attacker's type. We demonstrate that the Bayesian equilibrium defensive resource allocation strategy is a mixture of the Nash equilibrium strategies from the games against the two types of attackers separately.

Original languageEnglish (US)
Title of host publication2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665494045
DOIs
StatePublished - 2022
Event2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022 - Virtual, Online, United States
Duration: Nov 14 2022Nov 15 2022

Publication series

Name2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022

Conference

Conference2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022
Country/TerritoryUnited States
CityVirtual, Online
Period11/14/2211/15/22

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Safety Research
  • Safety, Risk, Reliability and Quality

Keywords

  • Bayesian game
  • Network protection
  • non-zero-sum game

Fingerprint

Dive into the research topics of 'Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers'. Together they form a unique fingerprint.

Cite this