Back to Search
Start Over
Harnessing the Power of Deception in Attack Graph-Based Security Games
- Source :
- Lecture Notes in Computer Science ISBN: 9783030647926, GameSec
- Publication Year :
- 2020
- Publisher :
- Springer International Publishing, 2020.
-
Abstract
- We study the use of deception in attack graph-based Stackelberg security games. In our setting, in addition to allocating defensive resources to protect important targets from attackers, the defender can strategically manipulate the attack graph through three main types of deceptive actions. We show that finding the optimal deception and defense strategy is at least NP-hard. We provide two techniques for efficiently solving this problem: a mixed-integer linear program for layered directed acyclic graphs (DAGs) and neural architecture search for general DAGs. We empirically demonstrate that using deception on attack graphs gives the defender a significant advantage, and the algorithms we develop scale gracefully to medium-sized problems.
- Subjects :
- 050101 languages & linguistics
Linear programming
Computer science
media_common.quotation_subject
05 social sciences
ComputingMilieux_LEGALASPECTSOFCOMPUTING
02 engineering and technology
Deception
Attack graph
Directed acyclic graph
Computer security
computer.software_genre
Power (physics)
0202 electrical engineering, electronic engineering, information engineering
Stackelberg competition
020201 artificial intelligence & image processing
0501 psychology and cognitive sciences
computer
media_common
Subjects
Details
- ISBN :
- 978-3-030-64792-6
- ISBNs :
- 9783030647926
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science ISBN: 9783030647926, GameSec
- Accession number :
- edsair.doi...........a7219cfb3b9eb57db602e4e524fde3ea
- Full Text :
- https://doi.org/10.1007/978-3-030-64793-3_8