@inproceedings{c240763ef4a54d58891071e28d9dc73b,
title = "A game-theoretic analysis of deception over social networks using fake avatars",
abstract = "In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.",
keywords = "Deception, Fake avatar, Game theory, Network security, Signaling game, Social network",
author = "Amin Mohammadi and Manshaei, {Mohammad Hossein} and Moghaddam, {Monireh Mohebbi} and Quanyan Zhu",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing AG 2016.; 7th International Conference on Decision and Game Theory for Security, GameSec 2016 ; Conference date: 02-11-2016 Through 04-11-2016",
year = "2016",
doi = "10.1007/978-3-319-47413-7_22",
language = "English (US)",
isbn = "9783319474120",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "382--394",
editor = "Emmanouil Panaousis and Milind Tambe and Tansu Alpcan and William Casey and Quanyan Zhu",
booktitle = "Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings",
}