8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)

Research Article

Cyber Security via Minority Games with Epistatic Signaling

  • @INPROCEEDINGS{10.4108/icst.bict.2014.257967,
        author={William Casey and Rhiannon Weaver and Leigh Metcalf and Jose Morales and Evan Wright and Bud Mishra},
        title={Cyber Security via Minority Games with Epistatic Signaling},
        proceedings={8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)},
        publisher={ICST},
        proceedings_a={BICT},
        year={2015},
        month={2},
        keywords={signaling game evolutionary games cyber security simulation},
        doi={10.4108/icst.bict.2014.257967}
    }
    
  • William Casey
    Rhiannon Weaver
    Leigh Metcalf
    Jose Morales
    Evan Wright
    Bud Mishra
    Year: 2015
    Cyber Security via Minority Games with Epistatic Signaling
    BICT
    ACM
    DOI: 10.4108/icst.bict.2014.257967
William Casey,*, Rhiannon Weaver1, Leigh Metcalf1, Jose Morales1, Evan Wright1, Bud Mishra2
  • 1: Software Engineering Institute, Carnegie Mellon University
  • 2: Courant Institute, New York University
*Contact email: austincasey@gmail.com

Abstract

We present a game theoretic framework, modeling strategic interactions among humans and things, which are assumed to be interconnected by a social-technological network, as in Internet of Humans and Things (IOHT). Often a pair of agents in the network interacts in order for an informed sender-agent to signal an uninformed receiver-agent to take an action that benefits each of the players -- the benefits to the pair of agents are modeled by two separate utility functions, both depending on the sender's private information, the signal exchanged, and the receiver's revealed (and unrevealed) action. In general, the two agents' utilities may not be aligned and may encourage deceptive behavior. A rather troublesome situation occurs when deceptions are employed to breach the security of the system, thus making the entire social-technological network unreliable. We explore two augmentations to the original evolutionary signaling game by first enhancing mutation bias toward strategies performing well in previous populations and secondly by allowing the parameters of the utility functions to dependent on population preferences giving rise to a minority game with epistatic signaling. The resulting game systems are empirically studied through extensive computer simulation.