Filters








40 Hits in 8.6 sec

Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense [article]

Sailik Sengupta, Subbarao Kambhampati
2020 arXiv   pre-print
To address these concerns, we propose (1) a unifying game-theoretic model, called the Bayesian Stackelberg Markov Games (BSMGs), that can model uncertainty over attacker types and the nuances of an MTD  ...  system and (2) a Bayesian Strong Stackelberg Q-learning (BSS-Q) approach that can, via interaction, learn the optimal movement policy for BSMGs within a reasonable time.  ...  Acknowlegements The research is supported in part by ONR grants N00014-16-1-2892, N00014-18-1-2442, N00014-18-1-2840, N00014-19-1-2119, AFOSR grant FA9550-18-1-0067, DARPA SAIL-ON grant W911NF-19-2-0006  ... 
arXiv:2007.10457v1 fatcat:ddz3g2cezza57lhf3tdhtdkwxa

Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

Mohamed Abdalzaher, Karim Seddik, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa, Adel Abdel-Rahman
2016 Sensors  
Section 4 illustrates the proposed taxonomy of game theory defense strategies for WSN security showing the types of attacks and the types of suitable games to mitigate these attacks.  ...  Then, we propose a taxonomy of game theoretic defense strategies taking into consideration the attacked layer, attack features, attack consequences, convenient defense game approach, and game type.  ...  In [77] , a repeated game is presented targeting a defense against passive DoS attack.  ... 
doi:10.3390/s16071003 pmid:27367700 pmcid:PMC4970053 fatcat:3utgdvzzdvhpjnvvsaweywmyvm

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek for developing proactive, adaptive MTD mechanisms.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of RDECOM ITC-PAC, US-ARL  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
2021 arXiv   pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources.  ...  Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
arXiv:2101.10121v2 fatcat:ko2mzzvyerehnfxbwgeuz72ilu

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

2020 KSII Transactions on Internet and Information Systems  
The Q-learning algorithm associated with an onedevice federated jamming detection mechanism [12] played an important role in the defense against smart jamming attack in FANET.  ...  In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local  ...  The authors in [15] extended the DQN algorithm to the scenario of incomplete information game, and proposed a deep recurrent Q-networks (DRQN) in the three-dimension space to obtain the optimal anti-jamming  ... 
doi:10.3837/tiis.2020.12.004 fatcat:osdb3en4freebgfxzzghzevxma

Game Theoretic Approaches in Vehicular Networks: A Survey [article]

Zemin Sun, Yanheng Liu, Jian Wang, Carie Anil, Dongpu Cao
2020 arXiv   pre-print
In the era of the Internet of Things (IoT), vehicles and other intelligent components in Intelligent Transportation System (ITS) are connected, forming the Vehicular Networks (VNs) that provide efficient  ...  Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of  ...  Moreover, to make the communication secure against the selfish behaviors or attacks of malicious nodes, intelligent devices in VNs should make efficient defense decisions.  ... 
arXiv:2006.00992v1 fatcat:lljjlitvlvbvhbg3aot5xszefm

Dynamic Games for Secure and Resilient Control System Design [article]

Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu
2019 arXiv   pre-print
In this review, we first provide a multi-layer perspective toward increasingly complex and integrated control systems and then introduce several variants of dynamic games for modeling different layers  ...  The paper is concluded with a discussion on emerging areas of research that crosscut dynamic games and control systems.  ...  These approaches use different game models [27] , [28] such as zero-sum game, stochastic game, repeated game, differential game, Stackelberg game, etc., to handle different type of attacks including  ... 
arXiv:1910.07510v3 fatcat:4rxeyse6dnbspop7hxalhzcedq

Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
2013 ACM Computing Surveys  
The presented works are classified into six main categories based on their topics: security of the physical and MAC layers, application layer security in mobile networks, intrusion detection systems, anonymity  ...  In addition, a discussion on advantages, drawbacks, and the future direction of using game theory in this field is provided.  ...  INTRUSION DETECTION SYSTEMS An Intrusion Detection System (IDS) is an important defense mechanism against a variety of attacks that can compromise the security of an information system [Debar et al. 2005  ... 
doi:10.1145/2480741.2480742 fatcat:55ixmohvijaelflxqrrbtnvfuu

A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks

Behrouz Jedari, Feng Xia, Zhaolong Ning
2018 IEEE Communications Surveys and Tutorials  
node detection and defense systems, and (4) incentive mechanisms.  ...  Meanwhile, misbehaving nodes can launch different types of internal attacks (e.g., blackhole and trust-related attacks) to disrupt the normal operation of the network.  ...  The authors are grateful to the anonymous reviewers for their constructive comments and suggestions to improve the quality of the article.  ... 
doi:10.1109/comst.2018.2791428 fatcat:2v6odowj4rhx5ico7g2i4pk6ne

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges [article]

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 arXiv   pre-print
In this article, we provide a comprehensive survey of the recent development of ML based SS methods, the most critical security issues, and corresponding defense mechanisms.  ...  In particular, we elaborate the state-of-the-art methodologies for improving the performance of SS communication systems for various vital aspects, including ML based cognitive radio networks (CRNs), ML  ...  Repeated games for sharing spectrum resources were then employed to maximize resource utilization in the coexistence system.  ... 
arXiv:2201.04677v1 fatcat:gb73bku37fatncamax67buwkea

A Survey of Moving Target Defenses for Network Security [article]

Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati
2020 arXiv   pre-print
To take away this asymmetric advantage, Moving Target Defense (MTD) continuously shifts the configuration of the underlying system, in turn reducing the success rate of cyberattacks.  ...  In trying to answer the latter question, we showcase the use of domain knowledge and game-theoretic modeling can help the defender come up with effective and efficient movement strategies.  ...  In Section II, we introduce the reader to some background knowledge about the various stages of an attack in cloud systems, popular for detections and defenses against malicious traffic, and formal frameworks  ... 
arXiv:1905.00964v2 fatcat:tpb6i4zpjnbm3pwdoz3wsckeie

Incentive Mechanisms for Federated Learning: From Economic and Game Theoretic Perspective [article]

Xuezhen Tu, Kun Zhu, Nguyen Cong Luong, Dusit Niyato, Yang Zhang, Juan Li
2021 arXiv   pre-print
Meanwhile, the data owners are rational and may be unwilling to participate in the collaborative learning process due to the resource consumption.  ...  In this paper, we provide a comprehensive review for the economic and game theoretic approaches proposed in the literature to design various schemes for stimulating data owners to participate in FL training  ...  This system consists of one top chain and ground chains. In each ground chain, a multi-leader and multi-follower Stackelberg game is used to motivate vehicles to join in the FL.  ... 
arXiv:2111.11850v1 fatcat:24xqnqiqtbh2hdn6lnkdkctqii

A Game-Theoretic Decision-Making Framework for Engineering Self-Protecting Software Systems

Mahsa Emami-Taba
2017 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)  
MARGIN, protects the software system against dynamic strategies of attacker. UBSP, handles adversary-type uncertainty.  ...  Inspired by game theory, in this research work, we model the interactions between the attacker and the software system as a two-player game.  ...  In addition to our academic collaboration, I greatly value the close personal rapport that Ladan and I have forged over the years.  ... 
doi:10.1109/icse-c.2017.43 dblp:conf/icse/Emami-Taba17a fatcat:74km5e6offew7clmulxo3py6fa

Fog Computing Systems: State of the Art, Research Issues and Future Trends, with a Focus on Resilience [article]

Jose Moura, David Hutchison
2020 arXiv   pre-print
This paper surveys the state of the art in the relevant fields, and discusses the research issues and future trends that are emerging.  ...  using Game Theory, and flexibly programmed with the latest software and virtualization platforms.  ...  David Hutchison is grateful to many colleagues in the EU COST Action RECODIS (CA15127) for discussions on the resilience of communication systems.  ... 
arXiv:1908.05077v4 fatcat:tgtn7rlkpnejxixctw5gorlxnu

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems [article]

Mingyue Zhang, Nianyu Li, Sridhar Adepu, Eunsuk Kang, Zhi Jin
2021 arXiv   pre-print
Then, an algorithm is designed to automatically build a Bayesian game based on the system architecture (of which some components might have been compromised) once an attack is detected, in which the system  ...  Finally, an optimal defensive policy is computed by solving the Bayesian game to achieve the best system utility, which amounts to minimizing the impact of the attack.  ...  We propose a multi-player Bayesian game to model the system under attack and to plan an optimal defensive policy for the system by solving the game.  ... 
arXiv:2112.07588v1 fatcat:7vhrtvbd6jbfvhracubumdu7c4
« Previous Showing results 1 — 15 out of 40 results