Skip to main content

A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design

  • Conference paper
Decision and Game Theory for Security (GameSec 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8840))

Included in the following conference series:

Abstract

In many security problems, service providers are basically unaware of the type of their clients. The client can potentially be an attacker who will launch an attack at any time during their connections to service providers. Our main goal is to provide a general framework for modeling security problems subject to different types of clients connected to service providers. We develop an incomplete information two-player game, to capture the interaction between the service provider (i.e., the server) and an unknown client. In particular, we consider two types of clients, i.e., attacker and benign clients. We analyze the game using perfect Bayesian Nash equilibrium (PBNE) with different conditions. We finally design an algorithm using the computed PBNE strategy profiles to find the best defense strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fudenberg, D., Tirole, J.: Game theory. MIT Press (1991)

    Google Scholar 

  2. Jain, M., An, B., Tambe, M.: Security games applied to real-world: Research contributions and challenges. In: Moving Target Defense II, pp. 15–39. Springer (2013)

    Google Scholar 

  3. Jin, X., Pissinou, N., Pumpichet, S., Kamhoua, C.A., Kwiat, K.: Modeling cooperative, selfish and malicious behaviors for trajectory privacy preservation using bayesian game theory. In: Local Computer Networks (LCN), pp. 835–842. IEEE (2013)

    Google Scholar 

  4. Liang, X., Xiao, Y.: Game theory for network security. IEEE Communications Surveys & Tutorials 15(1), 472–486 (2013)

    Article  Google Scholar 

  5. Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attack-defense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 4. ACM (2006)

    Google Scholar 

  7. Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1–39 (2013)

    Article  Google Scholar 

  8. Nguyen, K.C., Alpcan, T., Basar, T.: Security games with incomplete information. In: International Conference on Communications (ICC), pp. 1–6. IEEE (2009)

    Google Scholar 

  9. Osborne, M.J.: An introduction to game theory, vol. 3. Oxford University Press, New York (2004)

    Google Scholar 

  10. Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of AAMAS 2008, pp. 895–902 (2008)

    Google Scholar 

  11. Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 234–247. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: IEEE CNS, pp. 73–81 (2013)

    Google Scholar 

  13. Tsai, J., Kiekintveld, C., Ordonez, F., Tambe, M., Rathi, S.: Iris-a tool for strategic security allocation in transportation networks (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Farhang, S., Manshaei, M.H., Esfahani, M.N., Zhu, Q. (2014). A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design. In: Poovendran, R., Saad, W. (eds) Decision and Game Theory for Security. GameSec 2014. Lecture Notes in Computer Science, vol 8840. Springer, Cham. https://doi.org/10.1007/978-3-319-12601-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12601-2_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12600-5

  • Online ISBN: 978-3-319-12601-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics