2012
DOI: 10.1007/978-3-642-34266-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Computing the Nash Equilibria of Intruder Classification Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…A subset of our results appeared in earlier versions of this paper [19], [20], in a simplified setting. Indeed, in [19], [20] we consider that the attack is characterized by a scalar quantity rather than a vector and impose the use of threshold strategies for the defender.…”
Section: Introductionmentioning
confidence: 77%
See 1 more Smart Citation
“…A subset of our results appeared in earlier versions of this paper [19], [20], in a simplified setting. Indeed, in [19], [20] we consider that the attack is characterized by a scalar quantity rather than a vector and impose the use of threshold strategies for the defender.…”
Section: Introductionmentioning
confidence: 77%
“…A subset of our results appeared in earlier versions of this paper [19], [20], in a simplified setting. Indeed, in [19], [20] we consider that the attack is characterized by a scalar quantity rather than a vector and impose the use of threshold strategies for the defender. Instead, here, we allow more flexibility by considering attack vectors of arbitrary dimension and considering the set of all possible classifiers and we prove that, at Nash equilibrium, the defender uses only threshold strategies on the attacker's reward (which is one of our main result).…”
Section: Introductionmentioning
confidence: 77%
“…The authors investigate the existence of a unique Nash equilibrium and best-response strategies under specific cost functions, and analyze long-term interactions using repeated games and a dynamic model. As another example, Dritsoula et al consider the problem of setting a threshold for classifying an attacker into one of two categories, spammer and spy, based on its intrusion attempts [32]. They give a characterization of the Nash equilibria in mixed strategies, and show that the equilibria can be computed in polynomial time.…”
Section: Configuration Of Detectorsmentioning
confidence: 99%
“…[19] & [20] discuss such scenarios where the inquiry into the nature and motivation of the attacker are discussed.…”
Section: Game Analysismentioning
confidence: 99%
“…For better visualization purpose we plot rewards for 10 strategies (whose results are representative of the results with larger range) to cover the aggression, with steps of 0.1 from 0 to 0.9 in Figures 8-10. 20 The simulation was conducted with three user profiles in terms of skill, sophistication and effectiveness as Below_Average, Average and Above_Average users. When in Low_Privilege_State, the Average user would attack and the Administrator defends, playing the perfect antagonizing, there is 0.5 probability that attack succeeds.…”
Section: Simulationmentioning
confidence: 99%