2020
DOI: 10.1007/978-3-030-46150-8_42
|View full text |Cite
|
Sign up to set email alerts
|

Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…For a majority of participants, those that attacked greater than 95% of the time, rebuilding that belief was difficult, if not impossible, because the effects of a positive outcome can persist long enough, through confirmation bias, until another positive outcome is experienced to reinforce their behavior. For cybersecurity, it is important to understand these human biases to construct effective defenses that can account for human bounded rationality and find the optimal rate of signaling (Cooney et al., 2019).…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…For a majority of participants, those that attacked greater than 95% of the time, rebuilding that belief was difficult, if not impossible, because the effects of a positive outcome can persist long enough, through confirmation bias, until another positive outcome is experienced to reinforce their behavior. For cybersecurity, it is important to understand these human biases to construct effective defenses that can account for human bounded rationality and find the optimal rate of signaling (Cooney et al., 2019).…”
Section: Discussionmentioning
confidence: 99%
“…When the signal is absent, players may attack with impunity. Therefore, research has begun to investigate the possible benefits of a defense signaling scheme that adds deception when a target is monitored by sometimes refraining from sending a signal (Cooney et al., 2019; Cranford et al., 2020a). If signals were always truthful, attackers would likely always comply because there is no evidence that attacking given a signal would result in a reward.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Among the rich literature of Stackelberg security games (SSGs) (Tambe 2011;Bucarey et al 2017), SSGs with realtime information have been studied recently. Some recent work in deception for cybersecurity, such as (Cooney et al 2019;Thakoor et al 2019), considers strategic signaling with boundedly rational attackers and attackers with different objectives and abilities, but no sensing is required to identify attackers; rather, the systems may interact with both normal and adversarial users. Some other work relies on human patrollers for real-time information (Zhang et al 2019;Wang et al 2019), and others rely on sensors that can notify the patroller when an opponent is detected (de Cote et al 2013;Basilico, De Nittis, and Gatti 2015;De Nittis and Gatti 2018).…”
Section: Related Workmentioning
confidence: 99%