TY - GEN
T1 - Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers
AU - Xu, Zhifan
AU - Baykal-Gursoy, Melike
N1 - Funding Information:
This material is based upon work supported by the National Science Foundation (Grant No.1901721).
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - This paper considers network protection games for a heterogeneous network system with N nodes against cyber-attackers of two different types of intentions. The first type tries to maximize damage based on the value of each net-worked node, while the second type only aims at successful infiltration. A defender, by applying defensive resources to networked nodes, can decrease those nodes' vulnerabilities. Meanwhile, the defender needs to balance the cost of using defensive resources and potential security benefits. Existing literature shows that, in a Nash equilibrium, the defender should adopt different resource allocation strategies against different types of attackers. However, it could be difficult for the defender to know the type of incoming cyber-attackers. A Bayesian game is investigated considering the case that the defender is uncertain about the attacker's type. We demonstrate that the Bayesian equilibrium defensive resource allocation strategy is a mixture of the Nash equilibrium strategies from the games against the two types of attackers separately.
AB - This paper considers network protection games for a heterogeneous network system with N nodes against cyber-attackers of two different types of intentions. The first type tries to maximize damage based on the value of each net-worked node, while the second type only aims at successful infiltration. A defender, by applying defensive resources to networked nodes, can decrease those nodes' vulnerabilities. Meanwhile, the defender needs to balance the cost of using defensive resources and potential security benefits. Existing literature shows that, in a Nash equilibrium, the defender should adopt different resource allocation strategies against different types of attackers. However, it could be difficult for the defender to know the type of incoming cyber-attackers. A Bayesian game is investigated considering the case that the defender is uncertain about the attacker's type. We demonstrate that the Bayesian equilibrium defensive resource allocation strategy is a mixture of the Nash equilibrium strategies from the games against the two types of attackers separately.
KW - Bayesian game
KW - Network protection
KW - non-zero-sum game
UR - http://www.scopus.com/inward/record.url?scp=85148450720&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85148450720&partnerID=8YFLogxK
U2 - 10.1109/HST56032.2022.10025437
DO - 10.1109/HST56032.2022.10025437
M3 - Conference contribution
AN - SCOPUS:85148450720
T3 - 2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022
BT - 2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022
Y2 - 14 November 2022 through 15 November 2022
ER -