Game theoretical security detection strategy for networked systems

In this paper, a game theoretical analysis method is presented to provide the optimal security detection strategies for heterogeneous networked systems. A two-stage game model is firstly established, in which the attacker and defender are considered as two players. In the first stage, the two player...

Full description

Saved in:
Bibliographic Details
Main Authors: Wu, Hao, Wang, Wei, Wen, Changyun, Li, Zhengguo
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2020
Subjects:
Online Access:https://hdl.handle.net/10356/142642
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-142642
record_format dspace
spelling sg-ntu-dr.10356-1426422020-06-26T02:11:59Z Game theoretical security detection strategy for networked systems Wu, Hao Wang, Wei Wen, Changyun Li, Zhengguo School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Networked Systems Game Theory In this paper, a game theoretical analysis method is presented to provide the optimal security detection strategies for heterogeneous networked systems. A two-stage game model is firstly established, in which the attacker and defender are considered as two players. In the first stage, the two players make decisions on whether to execute the attack/monitoring actions or to keep silence for each network unit. In the second stage, two important strategic varibles, i.e. the attack intensity and detection threshold, are cautiously determined. The necessary and sufficient conditions to ensure the existence of the Nash equilibriums for the game with complete information are rigorously analyzed. The results reflect that with limited resources and capacities, the defender (attacker) tends to perform defense (attack) actions and further allocate more defense (less attack) resources to the units with larger assets. Besides, Bayesian and robust Nash equilibrium analysis is provided for the game with incomplete information. Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. Thus the convexity restrictions can be relaxed and the computational complexity is effectively reduced, with comparison to the existing recursive calculation methods. Numerical examples are given to validate our theoretical results. 2020-06-26T02:11:59Z 2020-06-26T02:11:59Z 2018 Journal Article Wu, H., Wang, W., Wen, C., & Li, Z. (2018). Game theoretical security detection strategy for networked systems. Information Sciences, 453, 346-363. doi:10.1016/j.ins.2018.04.051 0020-0255 https://hdl.handle.net/10356/142642 10.1016/j.ins.2018.04.051 2-s2.0-85046021726 453 346 363 en Information Sciences © 2018 Elsevier Inc. All rights reserved.
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Networked Systems
Game Theory
spellingShingle Engineering::Electrical and electronic engineering
Networked Systems
Game Theory
Wu, Hao
Wang, Wei
Wen, Changyun
Li, Zhengguo
Game theoretical security detection strategy for networked systems
description In this paper, a game theoretical analysis method is presented to provide the optimal security detection strategies for heterogeneous networked systems. A two-stage game model is firstly established, in which the attacker and defender are considered as two players. In the first stage, the two players make decisions on whether to execute the attack/monitoring actions or to keep silence for each network unit. In the second stage, two important strategic varibles, i.e. the attack intensity and detection threshold, are cautiously determined. The necessary and sufficient conditions to ensure the existence of the Nash equilibriums for the game with complete information are rigorously analyzed. The results reflect that with limited resources and capacities, the defender (attacker) tends to perform defense (attack) actions and further allocate more defense (less attack) resources to the units with larger assets. Besides, Bayesian and robust Nash equilibrium analysis is provided for the game with incomplete information. Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. Thus the convexity restrictions can be relaxed and the computational complexity is effectively reduced, with comparison to the existing recursive calculation methods. Numerical examples are given to validate our theoretical results.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Wu, Hao
Wang, Wei
Wen, Changyun
Li, Zhengguo
format Article
author Wu, Hao
Wang, Wei
Wen, Changyun
Li, Zhengguo
author_sort Wu, Hao
title Game theoretical security detection strategy for networked systems
title_short Game theoretical security detection strategy for networked systems
title_full Game theoretical security detection strategy for networked systems
title_fullStr Game theoretical security detection strategy for networked systems
title_full_unstemmed Game theoretical security detection strategy for networked systems
title_sort game theoretical security detection strategy for networked systems
publishDate 2020
url https://hdl.handle.net/10356/142642
_version_ 1681059725273202688