A game-theoretic analysis of deception over social networks using fake avatars

Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

Original languageEnglish (US)
Title of host publicationDecision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings
EditorsEmmanouil Panaousis, Milind Tambe, Tansu Alpcan, William Casey, Quanyan Zhu
PublisherSpringer Verlag
Pages382-394
Number of pages13
ISBN (Print)9783319474120
DOIs
StatePublished - 2016
Event7th International Conference on Decision and Game Theory for Security, GameSec 2016 - New York, United States
Duration: Nov 2 2016Nov 4 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9996 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Conference on Decision and Game Theory for Security, GameSec 2016
Country/TerritoryUnited States
CityNew York
Period11/2/1611/4/16

Keywords

  • Deception
  • Fake avatar
  • Game theory
  • Network security
  • Signaling game
  • Social network

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A game-theoretic analysis of deception over social networks using fake avatars'. Together they form a unique fingerprint.

Cite this