全面分析使用数量反应的风险:当攻击者在不确定性下恶意改变行为时

IF 0.6 Q4 ECONOMICS
Games Pub Date : 2022-12-02 DOI:10.3390/g13060081
T. Nguyen, A. Yadav
{"title":"全面分析使用数量反应的风险:当攻击者在不确定性下恶意改变行为时","authors":"T. Nguyen, A. Yadav","doi":"10.3390/g13060081","DOIUrl":null,"url":null,"abstract":"In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense strategy. This paper investigates the attacker’s imitative behavior deception under uncertainty, in which the attacker mimics a (deceptive) Quantal Response behavior model by consistently playing according to a certain parameter value of that model, given that it is uncertain about the defender’s actual learning outcome. We have three main contributions. First, we introduce a new maximin-based algorithm to compute a robust attacker deception decision under uncertainty, given the defender is unaware of the attacker deception. Our polynomial algorithm is built via characterizing the decomposability of the attacker deception space as well optimal deception behavior of the attacker against the worst case of uncertainty. Second, we propose a new counter-deception algorithm to tackle the attacker’s deception. We theoretically show that there is a universal optimal defense solution, regardless of any private knowledge the defender has about the relation between their learning outcome and the attacker deception choice. Third, we conduct extensive experiments in various security game settings, demonstrating the effectiveness of our proposed counter-deception algorithms to handle the attacker manipulation.","PeriodicalId":35065,"journal":{"name":"Games","volume":"13 1","pages":"81"},"PeriodicalIF":0.6000,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty\",\"authors\":\"T. Nguyen, A. Yadav\",\"doi\":\"10.3390/g13060081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense strategy. This paper investigates the attacker’s imitative behavior deception under uncertainty, in which the attacker mimics a (deceptive) Quantal Response behavior model by consistently playing according to a certain parameter value of that model, given that it is uncertain about the defender’s actual learning outcome. We have three main contributions. First, we introduce a new maximin-based algorithm to compute a robust attacker deception decision under uncertainty, given the defender is unaware of the attacker deception. Our polynomial algorithm is built via characterizing the decomposability of the attacker deception space as well optimal deception behavior of the attacker against the worst case of uncertainty. Second, we propose a new counter-deception algorithm to tackle the attacker’s deception. We theoretically show that there is a universal optimal defense solution, regardless of any private knowledge the defender has about the relation between their learning outcome and the attacker deception choice. Third, we conduct extensive experiments in various security game settings, demonstrating the effectiveness of our proposed counter-deception algorithms to handle the attacker manipulation.\",\"PeriodicalId\":35065,\"journal\":{\"name\":\"Games\",\"volume\":\"13 1\",\"pages\":\"81\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2022-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Games\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3390/g13060081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ECONOMICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Games","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/g13060081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ECONOMICS","Score":null,"Total":0}
引用次数: 0

摘要

在安全游戏中,防御者通常必须根据观察到的一些攻击数据来预测攻击者的行为。然而,聪明的攻击者可以故意改变自己的行为来误导防御者的学习,从而导致无效的防御策略。本文研究了攻击者在不确定条件下的模仿行为欺骗,其中攻击者在防御者的实际学习结果不确定的情况下,通过根据一定的参数值一致地玩来模仿(欺骗性的)数量反应行为模型。我们有三个主要贡献。首先,我们引入了一种新的基于maximin的算法来计算不确定性下的鲁棒攻击者欺骗决策,假设防御者不知道攻击者的欺骗。我们的多项式算法是通过表征攻击者欺骗空间的可分解性以及攻击者在最坏的不确定性情况下的最优欺骗行为来构建的。其次,我们提出了一种新的反欺骗算法来解决攻击者的欺骗问题。我们从理论上证明了存在一个普遍的最优防御解决方案,无论防御者对他们的学习结果和攻击者的欺骗选择之间的关系有任何私人知识。第三,我们在各种安全游戏设置中进行了广泛的实验,证明了我们提出的反欺骗算法在处理攻击者操纵方面的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense strategy. This paper investigates the attacker’s imitative behavior deception under uncertainty, in which the attacker mimics a (deceptive) Quantal Response behavior model by consistently playing according to a certain parameter value of that model, given that it is uncertain about the defender’s actual learning outcome. We have three main contributions. First, we introduce a new maximin-based algorithm to compute a robust attacker deception decision under uncertainty, given the defender is unaware of the attacker deception. Our polynomial algorithm is built via characterizing the decomposability of the attacker deception space as well optimal deception behavior of the attacker against the worst case of uncertainty. Second, we propose a new counter-deception algorithm to tackle the attacker’s deception. We theoretically show that there is a universal optimal defense solution, regardless of any private knowledge the defender has about the relation between their learning outcome and the attacker deception choice. Third, we conduct extensive experiments in various security game settings, demonstrating the effectiveness of our proposed counter-deception algorithms to handle the attacker manipulation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Games
Games Decision Sciences-Statistics, Probability and Uncertainty
CiteScore
1.60
自引率
11.10%
发文量
65
审稿时长
11 weeks
期刊介绍: Games (ISSN 2073-4336) is an international, peer-reviewed, quick-refereeing open access journal (free for readers), which provides an advanced forum for studies related to strategic interaction, game theory and its applications, and decision making. The aim is to provide an interdisciplinary forum for all behavioral sciences and related fields, including economics, psychology, political science, mathematics, computer science, and biology (including animal behavior). To guarantee a rapid refereeing and editorial process, Games follows standard publication practices in the natural sciences.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信