TY - GEN
T1 - Mitigation of targeted and non-targeted covert attacks as a timing game
AU - Laszka, Aron
AU - Johnson, Benjamin
AU - Grossklags, Jens
PY - 2013
Y1 - 2013
N2 - We consider a strategic game in which a defender wants to maintain control over a resource that is subject to both targeted and non-targeted covert attacks. Because the attacks are covert, the defender must choose to secure the resource in real time without knowing who controls it. Each move by the defender to secure the resource has a one-time cost and these defending moves are not covert, so that a targeted attacker may time her attacks based on the defender's moves. The time between when a targeted attack starts and when it succeeds is given by an exponentially distributed random variable with a known rate. Non-targeted attackers are modeled together as a single attacker whose attacks arrive following a Poisson process. We find that in this regime, the optimal moving strategy for the defender is a periodic strategy, so that the time intervals between consecutive moves are constant.
AB - We consider a strategic game in which a defender wants to maintain control over a resource that is subject to both targeted and non-targeted covert attacks. Because the attacks are covert, the defender must choose to secure the resource in real time without knowing who controls it. Each move by the defender to secure the resource has a one-time cost and these defending moves are not covert, so that a targeted attacker may time her attacks based on the defender's moves. The time between when a targeted attack starts and when it succeeds is given by an exponentially distributed random variable with a known rate. Non-targeted attackers are modeled together as a single attacker whose attacks arrive following a Poisson process. We find that in this regime, the optimal moving strategy for the defender is a periodic strategy, so that the time intervals between consecutive moves are constant.
UR - http://www.scopus.com/inward/record.url?scp=84893363734&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893363734&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-02786-9_11
DO - 10.1007/978-3-319-02786-9_11
M3 - Conference contribution
AN - SCOPUS:84893363734
SN - 9783319027852
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 175
EP - 191
BT - Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Proceedings
PB - Springer Verlag
T2 - 4th International Conference on Decision and Game Theory for Security, GameSec 2013
Y2 - 11 November 2013 through 12 November 2013
ER -