Game theoretical security detection strategy for networked systems
In this paper, a game theoretical analysis method is presented to provide the optimal security detection strategies for heterogeneous networked systems. A two-stage game model is firstly established, in which the attacker and defender are considered as two players. In the first stage, the two player...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/142642 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-142642 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1426422020-06-26T02:11:59Z Game theoretical security detection strategy for networked systems Wu, Hao Wang, Wei Wen, Changyun Li, Zhengguo School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Networked Systems Game Theory In this paper, a game theoretical analysis method is presented to provide the optimal security detection strategies for heterogeneous networked systems. A two-stage game model is firstly established, in which the attacker and defender are considered as two players. In the first stage, the two players make decisions on whether to execute the attack/monitoring actions or to keep silence for each network unit. In the second stage, two important strategic varibles, i.e. the attack intensity and detection threshold, are cautiously determined. The necessary and sufficient conditions to ensure the existence of the Nash equilibriums for the game with complete information are rigorously analyzed. The results reflect that with limited resources and capacities, the defender (attacker) tends to perform defense (attack) actions and further allocate more defense (less attack) resources to the units with larger assets. Besides, Bayesian and robust Nash equilibrium analysis is provided for the game with incomplete information. Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. Thus the convexity restrictions can be relaxed and the computational complexity is effectively reduced, with comparison to the existing recursive calculation methods. Numerical examples are given to validate our theoretical results. 2020-06-26T02:11:59Z 2020-06-26T02:11:59Z 2018 Journal Article Wu, H., Wang, W., Wen, C., & Li, Z. (2018). Game theoretical security detection strategy for networked systems. Information Sciences, 453, 346-363. doi:10.1016/j.ins.2018.04.051 0020-0255 https://hdl.handle.net/10356/142642 10.1016/j.ins.2018.04.051 2-s2.0-85046021726 453 346 363 en Information Sciences © 2018 Elsevier Inc. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering Networked Systems Game Theory |
spellingShingle |
Engineering::Electrical and electronic engineering Networked Systems Game Theory Wu, Hao Wang, Wei Wen, Changyun Li, Zhengguo Game theoretical security detection strategy for networked systems |
description |
In this paper, a game theoretical analysis method is presented to provide the optimal security detection strategies for heterogeneous networked systems. A two-stage game model is firstly established, in which the attacker and defender are considered as two players. In the first stage, the two players make decisions on whether to execute the attack/monitoring actions or to keep silence for each network unit. In the second stage, two important strategic varibles, i.e. the attack intensity and detection threshold, are cautiously determined. The necessary and sufficient conditions to ensure the existence of the Nash equilibriums for the game with complete information are rigorously analyzed. The results reflect that with limited resources and capacities, the defender (attacker) tends to perform defense (attack) actions and further allocate more defense (less attack) resources to the units with larger assets. Besides, Bayesian and robust Nash equilibrium analysis is provided for the game with incomplete information. Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. Thus the convexity restrictions can be relaxed and the computational complexity is effectively reduced, with comparison to the existing recursive calculation methods. Numerical examples are given to validate our theoretical results. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Wu, Hao Wang, Wei Wen, Changyun Li, Zhengguo |
format |
Article |
author |
Wu, Hao Wang, Wei Wen, Changyun Li, Zhengguo |
author_sort |
Wu, Hao |
title |
Game theoretical security detection strategy for networked systems |
title_short |
Game theoretical security detection strategy for networked systems |
title_full |
Game theoretical security detection strategy for networked systems |
title_fullStr |
Game theoretical security detection strategy for networked systems |
title_full_unstemmed |
Game theoretical security detection strategy for networked systems |
title_sort |
game theoretical security detection strategy for networked systems |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/142642 |
_version_ |
1681059725273202688 |