TY - GEN
T1 - Game theory for cyber deception a tutorial
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2019 Copyright is held by the owner/author(s).
PY - 2019/4/1
Y1 - 2019/4/1
N2 - Deceptive and anti-deceptive technologies have been developed for various specific applications. But there is a significant need for a general, holistic, and quantitative framework of deception. Game theory provides an ideal set of tools to develop such a framework of deception. In particular, game theory captures the strategic and self-interested nature of attackers and defenders in cybersecurity. Additionally, control theory can be used to quantify the physical impact of attack and defense strategies. In this tutorial, we present an overview of game-theoretic models and design mechanisms for deception and counter-deception. The tutorial aims to provide a taxonomy of deception and counter-deception and understand how they can be conceptualized, quantified, and designed or mitigated. This tutorial gives an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of cyberdeception. The tutorial will also discuss open problems and research challenges that the HoTSoS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory.
AB - Deceptive and anti-deceptive technologies have been developed for various specific applications. But there is a significant need for a general, holistic, and quantitative framework of deception. Game theory provides an ideal set of tools to develop such a framework of deception. In particular, game theory captures the strategic and self-interested nature of attackers and defenders in cybersecurity. Additionally, control theory can be used to quantify the physical impact of attack and defense strategies. In this tutorial, we present an overview of game-theoretic models and design mechanisms for deception and counter-deception. The tutorial aims to provide a taxonomy of deception and counter-deception and understand how they can be conceptualized, quantified, and designed or mitigated. This tutorial gives an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of cyberdeception. The tutorial will also discuss open problems and research challenges that the HoTSoS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory.
UR - http://www.scopus.com/inward/record.url?scp=85068780357&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85068780357&partnerID=8YFLogxK
U2 - 10.1145/3314058.3314067
DO - 10.1145/3314058.3314067
M3 - Conference contribution
AN - SCOPUS:85068780357
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
PB - Association for Computing Machinery
T2 - 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
Y2 - 1 April 2019 through 3 April 2019
ER -