TY - GEN
T1 - To trust or not
T2 - 6th International Conference on Decision and Game Theory for Security, GameSec 2015
AU - Moghaddam, Monireh Mohebbi
AU - Manshaei, Mohammad Hossein
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - In this paper, we investigate the interactions between a service provider (SP) and a client, where the client does not have complete information about the security conditions of the service provider. The environment includes several resources of the service provider, a client who sends requests to the service provider, and the signal generated by the service provider and delivered to the client. By taking into account potential attacks on the service provider, we develop an extended signaling game model, where the prior probability of the signaling game is determined by the outcome of a normal form game between an attacker and the service provider as a defender. Our results show different equilibria of the game as well as conditions under which these equilibria can take place. This will eventually help the defender to select the best defense mechanism against potential attacks, given his knowledge about the type of the attacker.
AB - In this paper, we investigate the interactions between a service provider (SP) and a client, where the client does not have complete information about the security conditions of the service provider. The environment includes several resources of the service provider, a client who sends requests to the service provider, and the signal generated by the service provider and delivered to the client. By taking into account potential attacks on the service provider, we develop an extended signaling game model, where the prior probability of the signaling game is determined by the outcome of a normal form game between an attacker and the service provider as a defender. Our results show different equilibria of the game as well as conditions under which these equilibria can take place. This will eventually help the defender to select the best defense mechanism against potential attacks, given his knowledge about the type of the attacker.
KW - Computation outsourcing
KW - Game theory
KW - Network security
KW - Signaling game
UR - http://www.scopus.com/inward/record.url?scp=84958536535&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84958536535&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-25594-1_18
DO - 10.1007/978-3-319-25594-1_18
M3 - Conference contribution
AN - SCOPUS:84958536535
SN - 9783319255934
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 322
EP - 333
BT - Decision and Game Theory for Security - 6th International Conference, GameSec 2015, Proceedings
A2 - Khouzani, M.H.R.
A2 - Panaousis, Emmanouil
A2 - Theodorakopoulos, George
PB - Springer Verlag
Y2 - 4 November 2015 through 5 November 2015
ER -