TY - CHAP
T1 - Game-Theoretic Analysis of Cyber Deception
T2 - Evidence-Based Strategies and Dynamic Risk Mitigation
AU - Zhang, Tao
AU - Huang, Linan
AU - Pawlick, Jeffrey
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2020 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - Deception is a technique to mislead humans or computer systems by manipulating beliefs and information. For the applications of cyber deception, noncooperative games become a natural choice of models to capture the adversarial interactions between the players, and quantitatively characterize the conflicting incentives and strategic responses. In this chapter, we provide an overview of deception games in three different environments and extend the baseline signaling game models to include evidence through side-channel knowledge acquisition to capture the information asymmetry, dynamics, and strategic behaviors of deception. We analyze the deception in binary information space based on signaling game framework with a detector that gives off probabilistic evidence of the deception when the sender acts deceptively. We then focus on a class of continuous one-dimensional information space and take into account the cost of deception in the signaling game. We finally explore the multistage incomplete-information Bayesian game model for defensive deception for advanced persistent threats (APTs). We use the perfect Bayesian Nash equilibrium (PBNE) as the solution concept for the deception games and analyze the strategic equilibrium behaviors for both the deceivers and the deceivees.
AB - Deception is a technique to mislead humans or computer systems by manipulating beliefs and information. For the applications of cyber deception, noncooperative games become a natural choice of models to capture the adversarial interactions between the players, and quantitatively characterize the conflicting incentives and strategic responses. In this chapter, we provide an overview of deception games in three different environments and extend the baseline signaling game models to include evidence through side-channel knowledge acquisition to capture the information asymmetry, dynamics, and strategic behaviors of deception. We analyze the deception in binary information space based on signaling game framework with a detector that gives off probabilistic evidence of the deception when the sender acts deceptively. We then focus on a class of continuous one-dimensional information space and take into account the cost of deception in the signaling game. We finally explore the multistage incomplete-information Bayesian game model for defensive deception for advanced persistent threats (APTs). We use the perfect Bayesian Nash equilibrium (PBNE) as the solution concept for the deception games and analyze the strategic equilibrium behaviors for both the deceivers and the deceivees.
UR - http://www.scopus.com/inward/record.url?scp=105007274415&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=105007274415&partnerID=8YFLogxK
U2 - 10.1002/9781119593386.ch2
DO - 10.1002/9781119593386.ch2
M3 - Chapter
AN - SCOPUS:105007274415
SN - 9781119593362
SP - 27
EP - 58
BT - Modeling and Design of Secure Internet of Things
PB - Wiley
ER -