Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Title | Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Aggarwal, P., Maqbool, Z., Grover, A., Pammi, V. S. C., Singh, S., Dutt, V. |
Conference Name | 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) |
Date Published | jun |
Keywords | attacker, attacker strategies, attacks dynamics, behavioral game theory, cognitive modeling, Cognitive science, Computational modeling, Computer crime, computer games, computer security, Cost function, cyber security, cyber-attacks, cyber-security game, defacing Website games, defender, defender strategies, game theory, game-theoretic analysis, Games, learning (artificial intelligence), Probabilistic logic, pubcrawl170109, reinforcement learning, reinforcement-learning model, RL model, Web sites |
Abstract | The rate at which cyber-attacks are increasing globally portrays a terrifying picture upfront. The main dynamics of such attacks could be studied in terms of the actions of attackers and defenders in a cyber-security game. However currently little research has taken place to study such interactions. In this paper we use behavioral game theory and try to investigate the role of certain actions taken by attackers and defenders in a simulated cyber-attack scenario of defacing a website. We choose a Reinforcement Learning (RL) model to represent a simulated attacker and a defender in a 2x4 cyber-security game where each of the 2 players could take up to 4 actions. A pair of model participants were computationally simulated across 1000 simulations where each pair played at most 30 rounds in the game. The goal of the attacker was to deface the website and the goal of the defender was to prevent the attacker from doing so. Our results show that the actions taken by both the attackers and defenders are a function of attention paid by these roles to their recently obtained outcomes. It was observed that if attacker pays more attention to recent outcomes then he is more likely to perform attack actions. We discuss the implication of our results on the evolution of dynamics between attackers and defenders in cyber-security games. |
DOI | 10.1109/CyberSA.2015.7166127 |
Citation Key | aggarwal_cyber_2015 |
- cyber-security game
- Web sites
- RL model
- reinforcement-learning model
- Reinforcement learning
- pubcrawl170109
- Probabilistic logic
- learning (artificial intelligence)
- Games
- game-theoretic analysis
- game theory
- defender strategies
- defender
- defacing Website games
- attacker
- cyber-attacks
- cyber security
- Cost function
- computer security
- computer games
- Computer crime
- Computational modeling
- cognitive science
- cognitive modeling
- behavioral game theory
- attacks dynamics
- attacker strategies