Harnessing the Power of Deception in Attack Graph-Based Security Games

11Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We study the use of deception in attack graph-based Stackelberg security games. In our setting, in addition to allocating defensive resources to protect important targets from attackers, the defender can strategically manipulate the attack graph through three main types of deceptive actions. We show that finding the optimal deception and defense strategy is at least NP-hard. We provide two techniques for efficiently solving this problem: a mixed-integer linear program for layered directed acyclic graphs (DAGs) and neural architecture search for general DAGs. We empirically demonstrate that using deception on attack graphs gives the defender a significant advantage, and the algorithms we develop scale gracefully to medium-sized problems.

Author supplied keywords

Cite

CITATION STYLE

APA

Milani, S., Shen, W., Chan, K. S., Venkatesan, S., Leslie, N. O., Kamhoua, C., & Fang, F. (2020). Harnessing the Power of Deception in Attack Graph-Based Security Games. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12513 LNCS, pp. 147–167). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-64793-3_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free