Countering attacker data manipulation in security games
. Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6564 https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-7567 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-75672022-01-10T03:30:35Z Countering attacker data manipulation in security games BUTLER, Andrew R. NGUYEN, Thanh H. SINHA, Arunesh . Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior during learning, leading to an inaccurate model and ineffective defender strategies. In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary. Second, we extend this technique to be viable even when the defender has access to a minimal amount of historical data. Third, we utilize a maximin approach to optimize the defender’s strategy against the worst-case within the estimate uncertainty. Finally, we demonstrate the effectiveness of our counterdeception methods by performing extensive experiments, showing clear gain for the defender and loss for the deceptive attacker. 2021-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6564 https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Databases and Information Systems |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Databases and Information Systems |
spellingShingle |
Databases and Information Systems BUTLER, Andrew R. NGUYEN, Thanh H. SINHA, Arunesh Countering attacker data manipulation in security games |
description |
. Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior during learning, leading to an inaccurate model and ineffective defender strategies. In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary. Second, we extend this technique to be viable even when the defender has access to a minimal amount of historical data. Third, we utilize a maximin approach to optimize the defender’s strategy against the worst-case within the estimate uncertainty. Finally, we demonstrate the effectiveness of our counterdeception methods by performing extensive experiments, showing clear gain for the defender and loss for the deceptive attacker. |
format |
text |
author |
BUTLER, Andrew R. NGUYEN, Thanh H. SINHA, Arunesh |
author_facet |
BUTLER, Andrew R. NGUYEN, Thanh H. SINHA, Arunesh |
author_sort |
BUTLER, Andrew R. |
title |
Countering attacker data manipulation in security games |
title_short |
Countering attacker data manipulation in security games |
title_full |
Countering attacker data manipulation in security games |
title_fullStr |
Countering attacker data manipulation in security games |
title_full_unstemmed |
Countering attacker data manipulation in security games |
title_sort |
countering attacker data manipulation in security games |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2021 |
url |
https://ink.library.smu.edu.sg/sis_research/6564 https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf |
_version_ |
1770575991870062592 |