Countering attacker data manipulation in security games

. Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior...

Full description

Saved in:
Bibliographic Details
Main Authors: BUTLER, Andrew R., NGUYEN, Thanh H., SINHA, Arunesh
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2021
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/6564
https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7567
record_format dspace
spelling sg-smu-ink.sis_research-75672022-01-10T03:30:35Z Countering attacker data manipulation in security games BUTLER, Andrew R. NGUYEN, Thanh H. SINHA, Arunesh . Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior during learning, leading to an inaccurate model and ineffective defender strategies. In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary. Second, we extend this technique to be viable even when the defender has access to a minimal amount of historical data. Third, we utilize a maximin approach to optimize the defender’s strategy against the worst-case within the estimate uncertainty. Finally, we demonstrate the effectiveness of our counterdeception methods by performing extensive experiments, showing clear gain for the defender and loss for the deceptive attacker. 2021-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6564 https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Databases and Information Systems
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Databases and Information Systems
spellingShingle Databases and Information Systems
BUTLER, Andrew R.
NGUYEN, Thanh H.
SINHA, Arunesh
Countering attacker data manipulation in security games
description . Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior during learning, leading to an inaccurate model and ineffective defender strategies. In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary. Second, we extend this technique to be viable even when the defender has access to a minimal amount of historical data. Third, we utilize a maximin approach to optimize the defender’s strategy against the worst-case within the estimate uncertainty. Finally, we demonstrate the effectiveness of our counterdeception methods by performing extensive experiments, showing clear gain for the defender and loss for the deceptive attacker.
format text
author BUTLER, Andrew R.
NGUYEN, Thanh H.
SINHA, Arunesh
author_facet BUTLER, Andrew R.
NGUYEN, Thanh H.
SINHA, Arunesh
author_sort BUTLER, Andrew R.
title Countering attacker data manipulation in security games
title_short Countering attacker data manipulation in security games
title_full Countering attacker data manipulation in security games
title_fullStr Countering attacker data manipulation in security games
title_full_unstemmed Countering attacker data manipulation in security games
title_sort countering attacker data manipulation in security games
publisher Institutional Knowledge at Singapore Management University
publishDate 2021
url https://ink.library.smu.edu.sg/sis_research/6564
https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf
_version_ 1770575991870062592