Deception in finitely repeated security games

Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities, objectives, or other underlying characteristics. In a repeated interaction setting, the defender can collect attack data over time to reduce this uncertainty and learn an effecti...

Full description

Saved in:
Bibliographic Details
Main Authors: NGUYEN, Thanh H., WANG, Yongzhao, SINHA, Arunesh, WELLMAN, Michael P.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4795
https://ink.library.smu.edu.sg/context/sis_research/article/5798/viewcontent/10.1609_aaai.v33i01.33012133.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5798
record_format dspace
spelling sg-smu-ink.sis_research-57982020-01-16T10:12:04Z Deception in finitely repeated security games NGUYEN, Thanh H. WANG, Yongzhao SINHA, Arunesh WELLMAN, Michael P. Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities, objectives, or other underlying characteristics. In a repeated interaction setting, the defender can collect attack data over time to reduce this uncertainty and learn an effective defense. However, a clever attacker can manipulate the attack data to mislead the defender, influencing the learning process toward its own benefit. We investigate strategic deception on the part of an attacker with private type information, who interacts repeatedly with a defender. We present a detailed computation and analysis of both players’ optimal strategies given the attacker may play deceptively. Computational experiments illuminate conditions conducive to strategic deception, and quantify benefits to the attacker. By taking into account the attacker’s deception capacity, the defender can significantly mitigate loss from misleading attack actions. 2019-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4795 info:doi/10.1609/aaai.v33i01.33012133 https://ink.library.smu.edu.sg/context/sis_research/article/5798/viewcontent/10.1609_aaai.v33i01.33012133.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Computer and Systems Architecture Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Computer and Systems Architecture
Software Engineering
spellingShingle Computer and Systems Architecture
Software Engineering
NGUYEN, Thanh H.
WANG, Yongzhao
SINHA, Arunesh
WELLMAN, Michael P.
Deception in finitely repeated security games
description Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities, objectives, or other underlying characteristics. In a repeated interaction setting, the defender can collect attack data over time to reduce this uncertainty and learn an effective defense. However, a clever attacker can manipulate the attack data to mislead the defender, influencing the learning process toward its own benefit. We investigate strategic deception on the part of an attacker with private type information, who interacts repeatedly with a defender. We present a detailed computation and analysis of both players’ optimal strategies given the attacker may play deceptively. Computational experiments illuminate conditions conducive to strategic deception, and quantify benefits to the attacker. By taking into account the attacker’s deception capacity, the defender can significantly mitigate loss from misleading attack actions.
format text
author NGUYEN, Thanh H.
WANG, Yongzhao
SINHA, Arunesh
WELLMAN, Michael P.
author_facet NGUYEN, Thanh H.
WANG, Yongzhao
SINHA, Arunesh
WELLMAN, Michael P.
author_sort NGUYEN, Thanh H.
title Deception in finitely repeated security games
title_short Deception in finitely repeated security games
title_full Deception in finitely repeated security games
title_fullStr Deception in finitely repeated security games
title_full_unstemmed Deception in finitely repeated security games
title_sort deception in finitely repeated security games
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/4795
https://ink.library.smu.edu.sg/context/sis_research/article/5798/viewcontent/10.1609_aaai.v33i01.33012133.pdf
_version_ 1770575033073139712