SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
1/25
A Game Theoretic Analysis of Intrusion
Detection in Access Control Systems1
-
Tansu Alpcan & Tamer Başar
FEP3301 Computational Game Theory
Paper Presentation
Kim Hammar
kimham@kth.se
Division of Network and Systems Engineering
KTH Royal Institute of Technology
Oct 14, 2021
1
T. Alpcan and T. Basar. “A game theoretic analysis of intrusion detection in access control systems”. In: 2004
43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). Vol. 2. 2004, 1568–1573
Vol.2. doi: 10.1109/CDC.2004.1430267.
2/25
Outline
I Use case: Intrusion Detection
I System model
I A finite extensive-form model of the use case
I Elementary equilibrium analysis
I A static continuous-kernel game model of the use case
I Equilibrium analysis using Rosen’s Theorem
3/25
Use Case: Intrusion Detection
I Defender = IDS:
I System Operator with task of
detecting intrusions
I IT Infrastructure:
I Consist of a set of components (also
called “subsystems”).
I The infrastructure is equipped with a
network of sensors
I Sensors report anomalies/alerts to
the defender
I Each component has a set of
vulnerabilities
I Attacker:
I Can attack vulnerable components
Attacker
Defender
1
alerts
Gateway
7 8 9 10 11
6
5
4
3
2
12
13 14 15 16
17
18
19
21
23
20
22
24
25 26
27 28 29 30 31
3/25
Use Case: Intrusion Detection
I Defender = IDS:
I System Operator with task of
detecting intrusions
I IT Infrastructure:
I Consist of a set of components (also
called “subsystems”).
I The infrastructure is equipped with a
network of sensors
I Sensors report anomalies/alerts to
the defender
I Each component has a set of
vulnerabilities
I Attacker:
I Can attack vulnerable components
Attacker
Defender
1
alerts
Gateway
7 8 9 10 11
6
5
4
3
2
12
13 14 15 16
17
18
19
21
23
20
22
24
25 26
27 28 29 30 31
3/25
Use Case: Intrusion Detection
I Defender = IDS:
I System Operator with task of
detecting intrusions
I IT Infrastructure:
I Consist of a set of components (also
called “subsystems”).
I The infrastructure is equipped with a
network of sensors
I Sensors report anomalies/alerts to
the defender
I Each component has a set of
vulnerabilities
I Attacker:
I Can attack vulnerable components
Attacker
Defender
1
alerts
Gateway
7 8 9 10 11
6
5
4
3
2
12
13 14 15 16
17
18
19
21
23
20
22
24
25 26
27 28 29 30 31
4/25
System Model
I Infrastructure components
(Subsystems)
I T = {t1, t2, . . . tmax }
I Vulnerabilities
I I = {I1, I2, . . . , Imax }
I Attacks
I A = T × I
I Sensors
I S = {s1, s2, . . . , smax }
I Each sensor reports “alarm” or “no
alarm”.
I Each sensor si ∈ S corresponds to a
vulnerabilitiy Ii ∈ I
Attacker
Defender
1
alerts
Gateway
7 8 9 10 11
6
5
4
3
2
12
13 14 15 16
17
18
19
21
23
20
22
24
25 26
27 28 29 30 31
5/25
Example Infrastructure: One Subsystem, One Sensor and
One Vulnerability
I Infrastructure components
(Subsystems)
I T = {t1}
I Vulnerabilities
I I = {I1}
I Attacks
I A = {a = (t1, I1)}
I Sensors
I S = {s1}
Attacker
Defender
alerts
Subsystem t1
Sensor s1
Vulnerability I1
Gateway
6/25
Finite Extensive-Form Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
I Players: N = {Attacker, Defender, Nature} = {1, 2, 3}
I Action sets:
I A1 = {Attack, Continue}, A2 = {Alert → Defend, Alert →
Continue, No Alert → Defender, No Alert → Continue, },
A3 = {Alert, No Alert}
I Nature’s pre-defined strategy:
I f (Alert|Attack) = 2
3 , f (Alert|Continue) = 1
3
6/25
Finite Extensive-Form Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
6/25
Finite Extensive-Form Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
6/25
Finite Extensive-Form Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
6/25
Finite Extensive-Form Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (5, −10)
(10, −15) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
7/25
Extensive & Strategic Form of the Finite Game Model
Extensive Form:
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
Strategic Form:
" DC DD CD CC
A 0, −5
3 −5, 5 5, −25
3 10, −15
C
5
3, −10
3
5
3 , −20
3 0, −10
3 0, 0
#
(1)
7/25
Extensive & Strategic Form of the Finite Game Model
Extensive Form:
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0)
attack continue
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend continue defend continue continue
defend
continue
defend
Strategic Form:
"
DC DD CD CC
A 0, −5
3 −5, 5 5, −25
3 10, −15
C
5
3, −10
3
5
3 , −20
3 0, −10
3 0, 0
#
(2)
=⇒ No pure Nash equilibrium
8/25
Unique Mixed Nash Equilibrium Computed using
Lemke-Howson’s Algorithm
x
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (5, −10)
(10, −15) (0, 0) (0, −5) (0, 0)
attack, 1
5 continue, 1
5
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend,
0.86
continue,
0.14
defend,
0
continue,
1
continue,
1
defend,
0
continue,
0.14
defend,
0.86
Mixed Nash equilibrium (s∗
1 , s∗
2 ) ∈ ∆(A1) × ∆(A2):
I s∗
1 (Attack) = 1
5 , s∗
1 (Continue) = 4
5
I s∗
2 (Defend|Alert) = 0.86, s∗
2 (Continue|Alert) = 0.14,
s∗
2 (Defend|No Alert) = 0, s∗
2 (Continue|No Alert) = 1.
9/25
Limitations of the Finite Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (5, −10)
(10, −15) (0, 0) (0, −5) (0, 0)
attack, 1
5 continue, 1
5
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend,
0.86
continue,
0.14
defend,
0
continue,
1
continue,
1
defend,
0
continue,
0.14
defend,
0.86
Limitations:
I Hard to analyze for large systems (scalability)
I Hard to define all of the parameters in the model
I Equilibria depend greatly on the payoff-values, are they
realistic?
I Does mixed equilibria make sense?
9/25
Limitations of the Finite Game Model
Attacker
Nature Nature
Defender.1 Defender.2
(−5, 5) (10, −15) (−5, 5) (5, −10)
(10, −15) (0, 0) (0, −5) (0, 0)
attack, 1
5 continue, 1
5
alert, 1
3 no alert, 2
3
no alert, 1
3
alert, 2
3
defend,
0.86
continue,
0.14
defend,
0
continue,
1
continue,
1
defend,
0
continue,
0.14
defend,
0.86
Limitations:
I Hard to analyze for large systems (scalability)
I Hard to define all of the parameters in the model
Alternative model: continuous-kernel game
10/25
Continuous-Kernel Game Model (1/3)
I Attacker Action Space: A1 = RAmax
+ instead of
A1 = {a1, . . . , Amax }
I Defender Action Space: A2 = RDmax
+ instead of
A2 = {a1, . . . , Dmax }
I Nature/(Sensor Network) Action Space:
I A3 = RAmax ×Amax
+ instead of A3 = {alert, no alert} × A2 = P̄
I P̄ij represent the alert-weight that nature put on attack j when
attack i occurred.
I P̄ = I if the sensors are perfect.
I Attack detection metric: dq(i) = P̄ii
PAmax
j
¯
Pij
I For notational convenience, define:
P =
(
pi,j = −p̄i,j if i = j
pi,j = p̄i,j otherwise
(3)
10/25
Continuous-Kernel Game Model (1/3)
I Attacker Action Space: A1 = RAmax
+ instead of
A1 = {a1, . . . , Amax }
I Defender Action Space: A2 = RDmax
+ instead of
A2 = {a1, . . . , Dmax }
I Nature/(Sensor Network) Action Space:
I A3 = RAmax ×Amax
+ instead of A3 = {alert, no alert} × A2 = P̄
I P̄ij represent the alert-weight that nature put on attack j when
attack i occurred.
I P̄ = I if the sensors are perfect.
I Attack detection metric: dq(i) = P̄ii
PAmax
j
¯
Pij
I For notational convenience, define:
P =
(
pi,j = −p̄i,j if i = j
pi,j = p̄i,j otherwise
(4)
10/25
Continuous-Kernel Game Model (1/3)
I Attacker Action Space: A1 = RAmax
+ instead of
A1 = {a1, . . . , Amax }, pure strategy aA ∈ A1
I Defender Action Space: A2 = RDmax
+ instead of
A2 = {a1, . . . , Dmax }, pure strategy aD ∈ A2
I Nature/(Sensor Network) Action Space:
I A3 = RAmax ×Amax
+ instead of A3 = {alert, no alert} × A2 = P̄
I P̄ij represent the alert-weight that nature put on attack j when
attack i occurred.
I P̄ = I if the sensors are perfect.
I Attack detection metric: dq(i) = P̄ii
PAmax
j
¯
Pij
I For notational convenience, define:
P =
(
pi,j = −p̄i,j if i = j
pi,j = p̄i,j otherwise
(5)
11/25
Continuous-Kernel Game Model (2/3)
I Defender cost of being attacked: cD ∈ RAmax
I Attacker gain of successful attack: cA ∈ RAmax
I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that
models degree of vulnerability per attack
I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if
defense detects the attack and 0 otherwise.
I Cost of defender actions: α ∈ RDmax
+
I Cost of attacker actions: β ∈ RAmax
+
I False alarm weight: γ, defines how much to penalize false
alarms
11/25
Continuous-Kernel Game Model (2/3)
I Defender cost of being attacked: cD ∈ RAmax
I Attacker gain of successful attack: cA ∈ RAmax
I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that
models degree of vulnerability per attack
I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if
defense detects the attack and 0 otherwise.
I Cost of defender actions: α ∈ RDmax
+
I Cost of attacker actions: β ∈ RAmax
+
I False alarm weight: γ, defines how much to penalize false
alarms
11/25
Continuous-Kernel Game Model (2/3)
I Defender cost of being attacked: cD ∈ RAmax
I Attacker gain of successful attack: cA ∈ RAmax
I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that
models degree of vulnerability per attack
I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if
defense detects the attack and 0 otherwise.
I Cost of defender actions: α ∈ RDmax
+
I Cost of attacker actions: β ∈ RAmax
+
I False alarm weight: γ, defines how much to penalize false
alarms
11/25
Continuous-Kernel Game Model (2/3)
I Defender cost of being attacked: cD ∈ RAmax
I Attacker gain of successful attack: cA ∈ RAmax
I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that
models degree of vulnerability per attack
I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if
defense detects the attack and 0 otherwise.
I Cost of defender actions: α ∈ RDmax
+
I Cost of attacker actions: β ∈ RAmax
+
I False alarm weight: γ, defines how much to penalize false
alarms
12/25
Continuous-Kernel Game Model (3/3)
I Objective: Minimize costs rather than maximize utilities
I Defender Cost Function:
JD
(aA
, aD
, P) = (6)
γ(aA
)T
PQ̄aD
| {z }
false alarm
+ (aD
)T
diag(α)aD
| {z }
cost of defense
+ cD
(QaA
− Q̄aD
)
| {z }
cost of attack
I Attacker Cost Function:
JA
(aA
, aD
, P) = (7)
− γ(aA
)T
PQ̄aD
| {z }
detected
+ (aA
)T
diag(β)aA
| {z }
cost of attack
+ cA
(Q̄aD
− QaA
)
| {z }
gain of attack
I Summary: Continuous-kernel general-sum game with strictly
convex cost functions.
12/25
Continuous-Kernel Game Model (3/3)
I Objective: Minimize costs rather than maximize utilities
I Defender Cost Function:
JD
(aA
, aD
, P) = (8)
γ(aA
)T
PQ̄aD
| {z }
false alarm
+ (aD
)T
diag(α)aD
| {z }
cost of defense
+ cD
(QaA
− Q̄aD
)
| {z }
cost of attack
I Attacker Cost Function:
JA
(aA
, aD
, P) = (9)
− γ(aA
)T
PQ̄aD
| {z }
detected
+ (aA
)T
diag(β)aA
| {z }
cost of attack
+ cA
(Q̄aD
− QaA
)
| {z }
gain of attack
I Summary: Continuous-kernel general-sum game with strictly
convex cost functions.
12/25
Continuous-Kernel Game Model (3/3)
I Objective: Minimize costs rather than maximize utilities
I Defender Cost Function:
JD
(aA
, aD
, P) = (10)
γ(aA
)T
PQ̄aD
| {z }
false alarm
+ (aD
)T
diag(α)aD
| {z }
cost of defense
+ cD
(QaA
− Q̄aD
)
| {z }
cost of attack
I Attacker Cost Function:
JA
(aA
, aD
, P) = (11)
− γ(aA
)T
PQ̄aD
| {z }
detected
+ (aA
)T
diag(β)aA
| {z }
cost of attack
+ cA
(Q̄aD
− QaA
)
| {z }
gain of attack
I Summary: Continuous-kernel general-sum game with strictly
convex cost functions.
12/25
Continuous-Kernel Game Model (3/3)
I Objective: Minimize costs rather than maximize utilities
I Defender Cost Function:
JD
(aA
, aD
, P) = (12)
γ(aA
)T
PQ̄aD
| {z }
false alarm
+ (aD
)T
diag(α)aD
| {z }
cost of defense
+ cD
(QaA
− Q̄aD
)
| {z }
cost of attack
I Attacker Cost Function:
JA
(aA
, aD
, P) = (13)
− γ(aA
)T
PQ̄aD
| {z }
detected
+ (aA
)T
diag(β)aA
| {z }
cost of attack
+ cA
(Q̄aD
− QaA
)
| {z }
gain of attack
I Summary: Continuous-kernel general-sum game with convex
cost functions.
13/25
Equilibrium Analysis (1/3)
I Since JA, JD are strictly convex, the best-response
correspondences are obtained from the first order conditions:
I
∇aD (JD
(aA
, aD
, P)) = 0 (14)
∇aD (γ(aA
)T
PQ̄aD
+ (aD
)T
diag(α)aD
+ cD
(QaA
− Q̄aD
)) = 0
γ(aA
)T
PQ̄ + (aD
)T
(2diag(α)) − cD
Q̄ = 0
=⇒ BrD(aA
, P) = {cD
Q̄(2diag(α))−1
− γ(2diag(α))−1
Q̄T
PT
aA
}
and, analogously for the attacker:
∇aA (JD
(aA
, aD
, P)) = 0 (15)
− γPQ̄aD
+ (aA
)T
(2diag(β)) − cA
Q = 0
aA
= (2diag(β))−1
cA
Q + γ(2diag(β))−1
PQ̄aD
=⇒ BrA(aD
, P) = {(2diag(β))−1
cA
Q + γ(2diag(β))−1
PQ̄aD
}
13/25
Equilibrium Analysis (1/3)
I Since JA, JD are strictly convex, the best-response
correspondences are obtained from the first order conditions:
∇aD (JD
(aA
, aD
, P)) = 0 (16)
∇aD (γ(aA
)T
PQ̄aD
+ (aD
)T
diag(α)aD
+ cD
(QaA
− Q̄aD
)) = 0
γ(aA
)T
PQ̄ + (aD
)T
(2diag(α)) − cD
Q̄ = 0
=⇒ BrD(aA
, P) = {cD
Q̄(2diag(α))−1
− γ(2diag(α))−1
Q̄T
PT
aA
}
I and, analogously for the attacker:
∇aA (JD
(aA
, aD
, P)) = 0 (17)
− γPQ̄aD
+ (aA
)T
(2diag(β)) − cA
Q = 0
aA
= (2diag(β))−1
cA
Q + γ(2diag(β))−1
PQ̄aD
=⇒ BrA(aD
, P) = {(2diag(β))−1
cA
Q + γ(2diag(β))−1
PQ̄aD
}
13/25
Equilibrium Analysis (1/3)
I Since JA, JD are strictly convex, the best-response
correspondences are obtained from the first order conditions:
∇aD (JD
(aA
, aD
, P)) = 0 (18)
∇aD (γ(aA
)T
PQ̄aD
+ (aD
)T
diag(α)aD
+ cD
(QaA
− Q̄aD
)) = 0
γ(aA
)T
PQ̄ + (aD
)T
(2diag(α)) − cD
Q̄ = 0
=⇒ BrD(aA
, P) = {cD
Q̄(2diag(α))−1
− γ(2diag(α))−1
Q̄T
PT
aA
}
and, analogously for the attacker:
∇aA (JD
(aA
, aD
, P)) = 0 (19)
− γPQ̄aD
+ (aA
)T
(2diag(β)) − cA
Q = 0
aA
= (2diag(β))−1
cA
Q + γ(2diag(β))−1
PQ̄aD
=⇒ BrA(aD
, P) = {(2diag(β))−1
cA
Q + γ(2diag(β))−1
PQ̄aD
}
14/25
Equilibrium Analysis (2/3)
I For notational convenience, define
θD
(cD
Q̄, α) , [(cD
Q̄)1/(2α1), . . . , (cD
Q̄)Dmax /(2αDmax )]
θA
(cA
Q, β) , [(cA
Q)1/(2β1), . . . , (cA
Q)Amax /(2βAmax )]
I Then we can write the best response functions as:
BrD(aA
, P) = [θD
− γ(diag(2α))−1
Q̄T
PT
aA
]+
BrA(aD
, P) = [θA
+ γ(diag(2β))−1
PQ̄aD
]+
I The set of Nash equilibria is
{(aA
, aD
) | aA
∈ BrA(aD
, P), aD
∈ BrD(aA
, P)} (20)
I How large is this set? What do the elements of this set look
like?
15/25
Equilibrium Analysis (3/3)
I For notational convenience, define
θD
(cD
Q̄, α) , [(cD
Q̄)1/(2α1), . . . , (cD
Q̄)Dmax /(2αDmax )]
θA
(cA
Q, β) , [(cA
Q)1/(2β1), . . . , (cA
Q)Amax /(2βAmax )]
I Then we can write the best response functions as:
BrD(aA
, P) = [θD
− γ(diag(2α))−1
Q̄T
PT
aA
]+
BrA(aD
, P) = [θA
+ γ(diag(2β))−1
PQ̄aD
]+
I The set of Nash equilibria is
{(aA
, aD
) | aA
∈ BrA(aD
, P), aD
∈ BrD(aA
, P)} (21)
I How large is this set? What do the elements of this set look
like?
16/25
Main Contribution of the Paper
Theorem
There exists a unique NE. Further, if:
γ < (22)
min
"
mini θD
maxi (diag(2α))−1Q̄T PT θA
,
maxi θA
maxi (diag(2β))−1(−P)Q̄θD
#
Then the unique NE (aD∗, aA∗) satisfy aD,∗ > 0 and aA,∗ > 0 and
is given by:
aA∗
= (I + Z)−1
[θA
+ γ(diag(2β))−1
PQ̄θD
] (23)
aD∗
= (I + Z̄)−1
[θD
− γ(diag(2α))−1
Q̄T
PT
θA
] (24)
where Z , γ2(diag(2β))−1PQ̄(diag(2α))−1Q̄T PT and
Z̄ , γ2(diag(2α))−1Q̄T PT (diag(2β))−1PQ̄.
17/25
Rosen’s Existence Theorem23
Theorem (Pure Nash Equilibrium Existence for
Continuous-Kernel Games)
For each player i ∈ N, let Ai be a compact and convex subset of a
finite-dimensional Euclidean space, and the cost functional
Ji : A1 × . . . × AN → R be jointly continuous in all its arguments
and strictly convex in ai for every aj ∈ Aj, j ∈ N, j 6= i. Then, the
associated N-person nonzero-sum game admits a Nash equilibrium
in pure strategies.
2
T. Başar and G.J. Olsder. Dynamic Noncooperative Game Theory. Classics in Applied Mathematics. Society
for Industrial and Applied Mathematics, 1999. isbn: 9780898714296. url:
https://books.google.se/books?id=k1oF5AxmJlYC.
3
J. B. Rosen. “Existence and Uniqueness of Equilibrium Points for Concave N-Person Games”. In:
Econometrica 33.3 (1965), pp. 520–534. issn: 00129682, 14680262. url:
http://www.jstor.org/stable/1911749.
18/25
Proof of Theorem 1, Existence
I Existence of Pure NE:
I AA
, AD
are convex subsets of a Euclidean space
I JA
, JD
are jointly continuous in all their arguments and strictly
convex in aA
, aD
respectively,
I AA
, AD
are not compact.
I However, JD
(aA
, aD
, P) and JA
(aA
, aD
, P) grow unbounded
as |a| → ∞
I =⇒ by Rosen’s existence theorem, the game has a pure Nash
equilibrium.
18/25
Proof of Theorem 1, Existence
I Existence of Pure NE:
I AA
, AD
are convex subsets of a Euclidean space
I JA
, JD
are jointly continuous in all their arguments and strictly
convex in aA
, aD
respectively,
I AA
, AD
are not compact.
I However, JD
(aA
, aD
, P) and JA
(aA
, aD
, P) grow unbounded
as |a| → ∞
I =⇒ by Rosen’s existence theorem, the game has a pure Nash
equilibrium.
18/25
Proof of Theorem 1, Existence
I Existence of Pure NE:
I AA
, AD
are convex subsets of a Euclidean space
I JA
, JD
are jointly continuous in all their arguments and strictly
convex in aA
, aD
respectively,
I AA
, AD
are not compact.
I However, JD
(aA
, aD
, P) and JA
(aA
, aD
, P) grow unbounded
as |a| → ∞
I =⇒ by Rosen’s existence theorem, the game has a pure Nash
equilibrium.
19/25
Rosen’s Uniqueness Theorem (1/3) - Pseudo-gradient4
Definition (Pseudo-Gradient g(a) and Pseudo-Gradient
Operator ¯
∇)
Let ¯
∇ be the pseudo-gradient operator, defined through its
application on the cost vector J as:
¯
∇J ,








∂J1(a)
∂a1
∂J2(a)
∂a2
.
.
.
∂J|N|(a)
∂a|N|








= g(a) (25)
4
J. B. Rosen. “Existence and Uniqueness of Equilibrium Points for Concave N-Person Games”. In:
Econometrica 33.3 (1965), pp. 520–534. issn: 00129682, 14680262. url:
http://www.jstor.org/stable/1911749.
20/25
Proof Preliminaries (2/3) - Pseudo-Hessian5
Definition (Pseudo-Hessian)
Let G(a) be the Jacobian of the pseudo-gradient g(a) with respect
to a (also called pseudo-Hessian):
G(a) ,






∂2J1(a)
∂a2
1
∂2J1(a)
∂a1∂a2
. . . ∂2J1(a)
∂a1∂a|N|
.
.
.
...
.
.
.
∂2J|N|(a)
∂a|N|∂a1
∂2J|N|(a)
∂a|N|∂a2
. . .
∂2J|N|(a)
∂a2
|N|






(26)
Definition (Symmetrized Pseudo-Hessian)
Let G(a) be the Jacobian of the pseudo-gradient g(a) with respect
to a, i.e. the pseudo-Hessian, then the symmetrized pseudo-hessian
is defined as:
G(a) , G(a) + G(a)T
(27)
21/25
Proof Preliminaries (3/3) - Rosen’s Uniqueness Theorem6
Theorem (Unique Pure Nash Equilibrium Existence for
Continuous-Kernel Games)
If the symmetrized pseudo-Hessian G(a) is positive definite, the
pure equilibrium of a continuous-kernel game with strictly convex
cost functions is unique.
6
J. B. Rosen. “Existence and Uniqueness of Equilibrium Points for Concave N-Person Games”. In:
Econometrica 33.3 (1965), pp. 520–534. issn: 00129682, 14680262. url:
http://www.jstor.org/stable/1911749.
22/25
Proof of Theorem 1, Uniqueness
The pseudo-gradient is:
¯
∇J(a) =
h
(γ(aA
)T
PQ̄)1 + (aD
)T
(2α1) − (cD
Q̄)1 . . . (γ(aA
)T
PQ̄)Dmax + (aD
)T
(2αDmax ) − (cD
Q̄)Dmax
−(γPQ̄aD
)1 + (aA
)T
(2β1) − (cA
Q)1 . . . −(γPQ̄aD
)Amax + (aA
)T
(2βAmax ) − (cA
Q)Amax
i
(28)
22/25
Proof of Theorem 1, Uniqueness
The pseudo-gradient is:
¯
∇J(a) =
h
(γ(aA
)T
PQ̄)1 + (aD
)T
(2α1) − (cD
Q̄)1 . . . (γ(aA
)T
PQ̄)Dmax + (aD
)T
(2αDmax ) − (cD
Q̄)Dmax
−(γPQ̄aD
)1 + (aA
)T
(2β1) − (cA
Q)1 . . . −(γPQ̄aD
)Amax + (aA
)T
(2βAmax ) − (cA
Q)Amax
i
(29)
The pseudo-hessian is:
G(a) =













2α1 0 0 |
0
... 0 | γPQ̄
0 0 2αDmax |
— — — | — — —
| 2β1 0 0
−γPQ̄ | 0
... 0
| 0 0 2βAmax













(30)
22/25
Proof of Theorem 1, Uniqueness
The pseudo-gradient is:
¯
∇J(a) =
h
(γ(aA
)T
PQ̄)1 + (aD
)T
(2α1) − (cD
Q̄)1 . . . (γ(aA
)T
PQ̄)Dmax + (aD
)T
(2αDmax ) − (cD
Q̄)Dmax
−(γPQ̄aD
)1 + (aA
)T
(2β1) − (cA
Q)1 . . . −(γPQ̄aD
)Amax + (aA
)T
(2βAmax ) − (cA
Q)Amax
i
(31)
The pseudo-hessian is:
G(a) =













2α1 0 0 |
0
... 0 | γPQ̄
0 0 2αDmax |
— — — | — — —
| 2β1 0 0
−γPQ̄ | 0
... 0
| 0 0 2βAmax













(32)
Clearly, G(a) = G(a) + G(a)T = 4diag([α, β]T ), which is positive
definite.
22/25
Proof of Theorem 1, Uniqueness
The pseudo-gradient is:
¯
∇J(a) =
h
(γ(aA
)T
PQ̄)1 + (aD
)T
(2α1) − (cD
Q̄)1 . . . (γ(aA
)T
PQ̄)Dmax + (aD
)T
(2αDmax ) − (cD
Q̄)Dmax
−(γPQ̄aD
)1 + (aA
)T
(2β1) − (cA
Q)1 . . . −(γPQ̄aD
)Amax + (aA
)T
(2βAmax ) − (cA
Q)Amax
i
(33)
The pseudo-hessian is:
G(a) =













2α1 0 0 |
0
... 0 | γPQ̄
0 0 2αDmax |
— — — | — — —
| 2β1 0 0
−γPQ̄ | 0
... 0
z | 0 0 2βAmax













(34)
Clearly, G(a) = G(a) + G(a)T = 4diag([α, β]T ), which is positive
definite. Thus, by Rosen’s Uniqueness theorem, the NE is unique
23/25
Proof of Theorem 1, Analytical Characterization of NE
Recall the Best Response Functions:
BrD(aA
, P) = [θD
− γ(diag(2α))−1
Q̄T
PT
aA
]+
BrA(aD
, P) = [θA
+ γ(diag(2β))−1
PQ̄aD
]+
23/25
Proof of Theorem 1, Analytical Characterization of NE
Recall the Best Response Functions:
BrD(aA
, P) = [θD
− γ(diag(2α))−1
Q̄T
PT
aA
]+
BrA(aD
, P) = [θA
+ γ(diag(2β))−1
PQ̄aD
]+
Substitute aD in BrA(aD, P) with BrD(aA, P), we then obtain
the fixed point equation:
aA∗
= BrA(BrD(aA∗
, P), P)
= [θA
+ γ(diag(2β))−1
PQ̄[θD
− γ(diag(2α))−1
Q̄T
PT
aA∗
]+
]+
23/25
Proof of Theorem 1, Analytical Characterization of NE
Recall the Best Response Functions:
BrD(aA
, P) = [θD
− γ(diag(2α))−1
Q̄T
PT
aA
]+
BrA(aD
, P) = [θA
+ γ(diag(2β))−1
PQ̄aD
]+
Substitute aD in BrA(aD, P) with BrD(aA, P), we then obtain
the fixed point equation:
aA∗
= BrA(BrD(aA∗
, P), P)
= [θA
+ γ(diag(2β))−1
PQ̄[θD
− γ(diag(2α))−1
Q̄T
PT
aA∗
]+
]+
Solving for aA∗ and similarly for aD∗ yields:
aA∗
= (I + Z)−1
[θA
+ γ(diag(2β))−1
PQ̄θD
] (35)
aD∗
= (I + Z̄)−1
[θD
− γ(diag(2α))−1
Q̄T
PT
θA
] (36)
24/25
Conclusion
I Topic:
I The paper provides a game theoretic analysis of intrusion
detection
I Contributions:
I A finite extensive form non-cooperative game model
I A infinite continuous-kernel strategic non-cooperative game
model
I Existence and uniqueness proof of NE
I Repeated game simulation
25/25
Discussion
I General questions/Comments?
I Are there other existence/uniqueness theorems that
could have been used?
I Are cyber attacks continuous?
I The continuous-kernel model provide a richer analytical
analysis
I But, does it make sense in practice?
I Which Model makes most sense:
I Finite game model with NE in mixed strategies
I Infinite game model with NE in pure strategies

Más contenido relacionado

Similar a A Game Theoretic Analysis of Intrusion Detection in Access Control Systems - Paper review

presentation
presentationpresentation
presentation3ashmawy
 
presentation.pdf
presentation.pdfpresentation.pdf
presentation.pdfHanifaApril
 
Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...
Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...
Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...Pooyan Jamshidi
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...idescitation
 
Intrusion Response through Optimal Stopping
Intrusion Response through Optimal StoppingIntrusion Response through Optimal Stopping
Intrusion Response through Optimal StoppingKim Hammar
 
isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..butest
 
Intrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingIntrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingKim Hammar
 
Tensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEsTensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEsAlexander Litvinenko
 
Parallel R in snow (english after 2nd slide)
Parallel R in snow (english after 2nd slide)Parallel R in snow (english after 2nd slide)
Parallel R in snow (english after 2nd slide)Cdiscount
 
error 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docx
error 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docxerror 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docx
error 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docxSALU18
 
Introduction
IntroductionIntroduction
Introductionbutest
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Pluribus One
 
Ch3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhh
Ch3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhhCh3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhh
Ch3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhhdanielgetachew0922
 
Java: Introduction to Arrays
Java: Introduction to ArraysJava: Introduction to Arrays
Java: Introduction to ArraysTareq Hasan
 
Machine Learning: Make Your Ruby Code Smarter
Machine Learning: Make Your Ruby Code SmarterMachine Learning: Make Your Ruby Code Smarter
Machine Learning: Make Your Ruby Code SmarterAstrails
 
I have to understand this code and i have to explain the each line of.pdf
I have to understand this code and i have to explain the each line of.pdfI have to understand this code and i have to explain the each line of.pdf
I have to understand this code and i have to explain the each line of.pdfshreeaadithyaacellso
 
Hands-On Algorithms for Predictive Modeling
Hands-On Algorithms for Predictive ModelingHands-On Algorithms for Predictive Modeling
Hands-On Algorithms for Predictive ModelingArthur Charpentier
 
01_CS115 Machine Learning Overview .pdf
01_CS115 Machine Learning Overview  .pdf01_CS115 Machine Learning Overview  .pdf
01_CS115 Machine Learning Overview .pdfNguynTrngNhn42
 
Dynamic Programming - Part 1
Dynamic Programming - Part 1Dynamic Programming - Part 1
Dynamic Programming - Part 1Amrinder Arora
 

Similar a A Game Theoretic Analysis of Intrusion Detection in Access Control Systems - Paper review (20)

presentation
presentationpresentation
presentation
 
presentation.pdf
presentation.pdfpresentation.pdf
presentation.pdf
 
Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...
Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...
Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural ...
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
 
Intrusion Response through Optimal Stopping
Intrusion Response through Optimal StoppingIntrusion Response through Optimal Stopping
Intrusion Response through Optimal Stopping
 
isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
 
Intrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingIntrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal Stopping
 
Tensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEsTensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEs
 
Parallel R in snow (english after 2nd slide)
Parallel R in snow (english after 2nd slide)Parallel R in snow (english after 2nd slide)
Parallel R in snow (english after 2nd slide)
 
error 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docx
error 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docxerror 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docx
error 2.pdf101316, 6(46 PM01_errorPage 1 of 5http.docx
 
Introduction
IntroductionIntroduction
Introduction
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
ML unit-1.pptx
ML unit-1.pptxML unit-1.pptx
ML unit-1.pptx
 
Ch3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhh
Ch3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhhCh3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhh
Ch3(1).pptxbbbbbbbbbbbbbbbbbbbhhhhhhhhhh
 
Java: Introduction to Arrays
Java: Introduction to ArraysJava: Introduction to Arrays
Java: Introduction to Arrays
 
Machine Learning: Make Your Ruby Code Smarter
Machine Learning: Make Your Ruby Code SmarterMachine Learning: Make Your Ruby Code Smarter
Machine Learning: Make Your Ruby Code Smarter
 
I have to understand this code and i have to explain the each line of.pdf
I have to understand this code and i have to explain the each line of.pdfI have to understand this code and i have to explain the each line of.pdf
I have to understand this code and i have to explain the each line of.pdf
 
Hands-On Algorithms for Predictive Modeling
Hands-On Algorithms for Predictive ModelingHands-On Algorithms for Predictive Modeling
Hands-On Algorithms for Predictive Modeling
 
01_CS115 Machine Learning Overview .pdf
01_CS115 Machine Learning Overview  .pdf01_CS115 Machine Learning Overview  .pdf
01_CS115 Machine Learning Overview .pdf
 
Dynamic Programming - Part 1
Dynamic Programming - Part 1Dynamic Programming - Part 1
Dynamic Programming - Part 1
 

Más de Kim Hammar

Automated Security Response through Online Learning with Adaptive Con jectures
Automated Security Response through Online Learning with Adaptive Con jecturesAutomated Security Response through Online Learning with Adaptive Con jectures
Automated Security Response through Online Learning with Adaptive Con jecturesKim Hammar
 
Självlärande System för Cybersäkerhet. KTH
Självlärande System för Cybersäkerhet. KTHSjälvlärande System för Cybersäkerhet. KTH
Självlärande System för Cybersäkerhet. KTHKim Hammar
 
Learning Automated Intrusion Response
Learning Automated Intrusion ResponseLearning Automated Intrusion Response
Learning Automated Intrusion ResponseKim Hammar
 
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback ControlIntrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback ControlKim Hammar
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Kim Hammar
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Kim Hammar
 
Learning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionLearning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionKim Hammar
 
Digital Twins for Security Automation
Digital Twins for Security AutomationDigital Twins for Security Automation
Digital Twins for Security AutomationKim Hammar
 
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...Kim Hammar
 
Självlärande system för cyberförsvar.
Självlärande system för cyberförsvar.Självlärande system för cyberförsvar.
Självlärande system för cyberförsvar.Kim Hammar
 
CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...
CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...
CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...Kim Hammar
 
Self-Learning Systems for Cyber Defense
Self-Learning Systems for Cyber DefenseSelf-Learning Systems for Cyber Defense
Self-Learning Systems for Cyber DefenseKim Hammar
 
Self-learning Intrusion Prevention Systems.
Self-learning Intrusion Prevention Systems.Self-learning Intrusion Prevention Systems.
Self-learning Intrusion Prevention Systems.Kim Hammar
 
Learning Security Strategies through Game Play and Optimal Stopping
Learning Security Strategies through Game Play and Optimal StoppingLearning Security Strategies through Game Play and Optimal Stopping
Learning Security Strategies through Game Play and Optimal StoppingKim Hammar
 
Intrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingIntrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingKim Hammar
 
Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.
Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.
Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.Kim Hammar
 
Intrusion Prevention through Optimal Stopping.
Intrusion Prevention through Optimal Stopping.Intrusion Prevention through Optimal Stopping.
Intrusion Prevention through Optimal Stopping.Kim Hammar
 
Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021
Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021
Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021Kim Hammar
 
Självlärande system för cybersäkerhet
Självlärande system för cybersäkerhetSjälvlärande system för cybersäkerhet
Självlärande system för cybersäkerhetKim Hammar
 
Learning Intrusion Prevention Policies Through Optimal Stopping
Learning Intrusion Prevention Policies Through Optimal StoppingLearning Intrusion Prevention Policies Through Optimal Stopping
Learning Intrusion Prevention Policies Through Optimal StoppingKim Hammar
 

Más de Kim Hammar (20)

Automated Security Response through Online Learning with Adaptive Con jectures
Automated Security Response through Online Learning with Adaptive Con jecturesAutomated Security Response through Online Learning with Adaptive Con jectures
Automated Security Response through Online Learning with Adaptive Con jectures
 
Självlärande System för Cybersäkerhet. KTH
Självlärande System för Cybersäkerhet. KTHSjälvlärande System för Cybersäkerhet. KTH
Självlärande System för Cybersäkerhet. KTH
 
Learning Automated Intrusion Response
Learning Automated Intrusion ResponseLearning Automated Intrusion Response
Learning Automated Intrusion Response
 
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback ControlIntrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
 
Learning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionLearning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via Decomposition
 
Digital Twins for Security Automation
Digital Twins for Security AutomationDigital Twins for Security Automation
Digital Twins for Security Automation
 
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
 
Självlärande system för cyberförsvar.
Självlärande system för cyberförsvar.Självlärande system för cyberförsvar.
Självlärande system för cyberförsvar.
 
CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...
CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...
CNSM 2022 - An Online Framework for Adapting Security Policies in Dynamic IT ...
 
Self-Learning Systems for Cyber Defense
Self-Learning Systems for Cyber DefenseSelf-Learning Systems for Cyber Defense
Self-Learning Systems for Cyber Defense
 
Self-learning Intrusion Prevention Systems.
Self-learning Intrusion Prevention Systems.Self-learning Intrusion Prevention Systems.
Self-learning Intrusion Prevention Systems.
 
Learning Security Strategies through Game Play and Optimal Stopping
Learning Security Strategies through Game Play and Optimal StoppingLearning Security Strategies through Game Play and Optimal Stopping
Learning Security Strategies through Game Play and Optimal Stopping
 
Intrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingIntrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal Stopping
 
Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.
Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.
Introduktion till försvar mot nätverksintrång. 22 Feb 2022. EP1200 KTH.
 
Intrusion Prevention through Optimal Stopping.
Intrusion Prevention through Optimal Stopping.Intrusion Prevention through Optimal Stopping.
Intrusion Prevention through Optimal Stopping.
 
Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021
Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021
Learning Intrusion Prevention Policies through Optimal Stopping - CNSM2021
 
Självlärande system för cybersäkerhet
Självlärande system för cybersäkerhetSjälvlärande system för cybersäkerhet
Självlärande system för cybersäkerhet
 
Learning Intrusion Prevention Policies Through Optimal Stopping
Learning Intrusion Prevention Policies Through Optimal StoppingLearning Intrusion Prevention Policies Through Optimal Stopping
Learning Intrusion Prevention Policies Through Optimal Stopping
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

A Game Theoretic Analysis of Intrusion Detection in Access Control Systems - Paper review

  • 1. 1/25 A Game Theoretic Analysis of Intrusion Detection in Access Control Systems1 - Tansu Alpcan & Tamer Başar FEP3301 Computational Game Theory Paper Presentation Kim Hammar kimham@kth.se Division of Network and Systems Engineering KTH Royal Institute of Technology Oct 14, 2021 1 T. Alpcan and T. Basar. “A game theoretic analysis of intrusion detection in access control systems”. In: 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). Vol. 2. 2004, 1568–1573 Vol.2. doi: 10.1109/CDC.2004.1430267.
  • 2. 2/25 Outline I Use case: Intrusion Detection I System model I A finite extensive-form model of the use case I Elementary equilibrium analysis I A static continuous-kernel game model of the use case I Equilibrium analysis using Rosen’s Theorem
  • 3. 3/25 Use Case: Intrusion Detection I Defender = IDS: I System Operator with task of detecting intrusions I IT Infrastructure: I Consist of a set of components (also called “subsystems”). I The infrastructure is equipped with a network of sensors I Sensors report anomalies/alerts to the defender I Each component has a set of vulnerabilities I Attacker: I Can attack vulnerable components Attacker Defender 1 alerts Gateway 7 8 9 10 11 6 5 4 3 2 12 13 14 15 16 17 18 19 21 23 20 22 24 25 26 27 28 29 30 31
  • 4. 3/25 Use Case: Intrusion Detection I Defender = IDS: I System Operator with task of detecting intrusions I IT Infrastructure: I Consist of a set of components (also called “subsystems”). I The infrastructure is equipped with a network of sensors I Sensors report anomalies/alerts to the defender I Each component has a set of vulnerabilities I Attacker: I Can attack vulnerable components Attacker Defender 1 alerts Gateway 7 8 9 10 11 6 5 4 3 2 12 13 14 15 16 17 18 19 21 23 20 22 24 25 26 27 28 29 30 31
  • 5. 3/25 Use Case: Intrusion Detection I Defender = IDS: I System Operator with task of detecting intrusions I IT Infrastructure: I Consist of a set of components (also called “subsystems”). I The infrastructure is equipped with a network of sensors I Sensors report anomalies/alerts to the defender I Each component has a set of vulnerabilities I Attacker: I Can attack vulnerable components Attacker Defender 1 alerts Gateway 7 8 9 10 11 6 5 4 3 2 12 13 14 15 16 17 18 19 21 23 20 22 24 25 26 27 28 29 30 31
  • 6. 4/25 System Model I Infrastructure components (Subsystems) I T = {t1, t2, . . . tmax } I Vulnerabilities I I = {I1, I2, . . . , Imax } I Attacks I A = T × I I Sensors I S = {s1, s2, . . . , smax } I Each sensor reports “alarm” or “no alarm”. I Each sensor si ∈ S corresponds to a vulnerabilitiy Ii ∈ I Attacker Defender 1 alerts Gateway 7 8 9 10 11 6 5 4 3 2 12 13 14 15 16 17 18 19 21 23 20 22 24 25 26 27 28 29 30 31
  • 7. 5/25 Example Infrastructure: One Subsystem, One Sensor and One Vulnerability I Infrastructure components (Subsystems) I T = {t1} I Vulnerabilities I I = {I1} I Attacks I A = {a = (t1, I1)} I Sensors I S = {s1} Attacker Defender alerts Subsystem t1 Sensor s1 Vulnerability I1 Gateway
  • 8. 6/25 Finite Extensive-Form Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend I Players: N = {Attacker, Defender, Nature} = {1, 2, 3} I Action sets: I A1 = {Attack, Continue}, A2 = {Alert → Defend, Alert → Continue, No Alert → Defender, No Alert → Continue, }, A3 = {Alert, No Alert} I Nature’s pre-defined strategy: I f (Alert|Attack) = 2 3 , f (Alert|Continue) = 1 3
  • 9. 6/25 Finite Extensive-Form Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend
  • 10. 6/25 Finite Extensive-Form Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend
  • 11. 6/25 Finite Extensive-Form Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend
  • 12. 6/25 Finite Extensive-Form Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (5, −10) (10, −15) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend
  • 13. 7/25 Extensive & Strategic Form of the Finite Game Model Extensive Form: Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend Strategic Form: " DC DD CD CC A 0, −5 3 −5, 5 5, −25 3 10, −15 C 5 3, −10 3 5 3 , −20 3 0, −10 3 0, 0 # (1)
  • 14. 7/25 Extensive & Strategic Form of the Finite Game Model Extensive Form: Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (10, −15) (5, −10) (0, 0) (0, −5) (0, 0) attack continue alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend continue defend continue continue defend continue defend Strategic Form: " DC DD CD CC A 0, −5 3 −5, 5 5, −25 3 10, −15 C 5 3, −10 3 5 3 , −20 3 0, −10 3 0, 0 # (2) =⇒ No pure Nash equilibrium
  • 15. 8/25 Unique Mixed Nash Equilibrium Computed using Lemke-Howson’s Algorithm x Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (5, −10) (10, −15) (0, 0) (0, −5) (0, 0) attack, 1 5 continue, 1 5 alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend, 0.86 continue, 0.14 defend, 0 continue, 1 continue, 1 defend, 0 continue, 0.14 defend, 0.86 Mixed Nash equilibrium (s∗ 1 , s∗ 2 ) ∈ ∆(A1) × ∆(A2): I s∗ 1 (Attack) = 1 5 , s∗ 1 (Continue) = 4 5 I s∗ 2 (Defend|Alert) = 0.86, s∗ 2 (Continue|Alert) = 0.14, s∗ 2 (Defend|No Alert) = 0, s∗ 2 (Continue|No Alert) = 1.
  • 16. 9/25 Limitations of the Finite Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (5, −10) (10, −15) (0, 0) (0, −5) (0, 0) attack, 1 5 continue, 1 5 alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend, 0.86 continue, 0.14 defend, 0 continue, 1 continue, 1 defend, 0 continue, 0.14 defend, 0.86 Limitations: I Hard to analyze for large systems (scalability) I Hard to define all of the parameters in the model I Equilibria depend greatly on the payoff-values, are they realistic? I Does mixed equilibria make sense?
  • 17. 9/25 Limitations of the Finite Game Model Attacker Nature Nature Defender.1 Defender.2 (−5, 5) (10, −15) (−5, 5) (5, −10) (10, −15) (0, 0) (0, −5) (0, 0) attack, 1 5 continue, 1 5 alert, 1 3 no alert, 2 3 no alert, 1 3 alert, 2 3 defend, 0.86 continue, 0.14 defend, 0 continue, 1 continue, 1 defend, 0 continue, 0.14 defend, 0.86 Limitations: I Hard to analyze for large systems (scalability) I Hard to define all of the parameters in the model Alternative model: continuous-kernel game
  • 18. 10/25 Continuous-Kernel Game Model (1/3) I Attacker Action Space: A1 = RAmax + instead of A1 = {a1, . . . , Amax } I Defender Action Space: A2 = RDmax + instead of A2 = {a1, . . . , Dmax } I Nature/(Sensor Network) Action Space: I A3 = RAmax ×Amax + instead of A3 = {alert, no alert} × A2 = P̄ I P̄ij represent the alert-weight that nature put on attack j when attack i occurred. I P̄ = I if the sensors are perfect. I Attack detection metric: dq(i) = P̄ii PAmax j ¯ Pij I For notational convenience, define: P = ( pi,j = −p̄i,j if i = j pi,j = p̄i,j otherwise (3)
  • 19. 10/25 Continuous-Kernel Game Model (1/3) I Attacker Action Space: A1 = RAmax + instead of A1 = {a1, . . . , Amax } I Defender Action Space: A2 = RDmax + instead of A2 = {a1, . . . , Dmax } I Nature/(Sensor Network) Action Space: I A3 = RAmax ×Amax + instead of A3 = {alert, no alert} × A2 = P̄ I P̄ij represent the alert-weight that nature put on attack j when attack i occurred. I P̄ = I if the sensors are perfect. I Attack detection metric: dq(i) = P̄ii PAmax j ¯ Pij I For notational convenience, define: P = ( pi,j = −p̄i,j if i = j pi,j = p̄i,j otherwise (4)
  • 20. 10/25 Continuous-Kernel Game Model (1/3) I Attacker Action Space: A1 = RAmax + instead of A1 = {a1, . . . , Amax }, pure strategy aA ∈ A1 I Defender Action Space: A2 = RDmax + instead of A2 = {a1, . . . , Dmax }, pure strategy aD ∈ A2 I Nature/(Sensor Network) Action Space: I A3 = RAmax ×Amax + instead of A3 = {alert, no alert} × A2 = P̄ I P̄ij represent the alert-weight that nature put on attack j when attack i occurred. I P̄ = I if the sensors are perfect. I Attack detection metric: dq(i) = P̄ii PAmax j ¯ Pij I For notational convenience, define: P = ( pi,j = −p̄i,j if i = j pi,j = p̄i,j otherwise (5)
  • 21. 11/25 Continuous-Kernel Game Model (2/3) I Defender cost of being attacked: cD ∈ RAmax I Attacker gain of successful attack: cA ∈ RAmax I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that models degree of vulnerability per attack I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if defense detects the attack and 0 otherwise. I Cost of defender actions: α ∈ RDmax + I Cost of attacker actions: β ∈ RAmax + I False alarm weight: γ, defines how much to penalize false alarms
  • 22. 11/25 Continuous-Kernel Game Model (2/3) I Defender cost of being attacked: cD ∈ RAmax I Attacker gain of successful attack: cA ∈ RAmax I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that models degree of vulnerability per attack I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if defense detects the attack and 0 otherwise. I Cost of defender actions: α ∈ RDmax + I Cost of attacker actions: β ∈ RAmax + I False alarm weight: γ, defines how much to penalize false alarms
  • 23. 11/25 Continuous-Kernel Game Model (2/3) I Defender cost of being attacked: cD ∈ RAmax I Attacker gain of successful attack: cA ∈ RAmax I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that models degree of vulnerability per attack I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if defense detects the attack and 0 otherwise. I Cost of defender actions: α ∈ RDmax + I Cost of attacker actions: β ∈ RAmax + I False alarm weight: γ, defines how much to penalize false alarms
  • 24. 11/25 Continuous-Kernel Game Model (2/3) I Defender cost of being attacked: cD ∈ RAmax I Attacker gain of successful attack: cA ∈ RAmax I Vulnerability matrix: Q ∈ RAmax ×Amax diagonal matrix that models degree of vulnerability per attack I Defense matrix: Q̄ ∈ {0, 1}Amax ×Dmax where Q̄i,j = 1 if defense detects the attack and 0 otherwise. I Cost of defender actions: α ∈ RDmax + I Cost of attacker actions: β ∈ RAmax + I False alarm weight: γ, defines how much to penalize false alarms
  • 25. 12/25 Continuous-Kernel Game Model (3/3) I Objective: Minimize costs rather than maximize utilities I Defender Cost Function: JD (aA , aD , P) = (6) γ(aA )T PQ̄aD | {z } false alarm + (aD )T diag(α)aD | {z } cost of defense + cD (QaA − Q̄aD ) | {z } cost of attack I Attacker Cost Function: JA (aA , aD , P) = (7) − γ(aA )T PQ̄aD | {z } detected + (aA )T diag(β)aA | {z } cost of attack + cA (Q̄aD − QaA ) | {z } gain of attack I Summary: Continuous-kernel general-sum game with strictly convex cost functions.
  • 26. 12/25 Continuous-Kernel Game Model (3/3) I Objective: Minimize costs rather than maximize utilities I Defender Cost Function: JD (aA , aD , P) = (8) γ(aA )T PQ̄aD | {z } false alarm + (aD )T diag(α)aD | {z } cost of defense + cD (QaA − Q̄aD ) | {z } cost of attack I Attacker Cost Function: JA (aA , aD , P) = (9) − γ(aA )T PQ̄aD | {z } detected + (aA )T diag(β)aA | {z } cost of attack + cA (Q̄aD − QaA ) | {z } gain of attack I Summary: Continuous-kernel general-sum game with strictly convex cost functions.
  • 27. 12/25 Continuous-Kernel Game Model (3/3) I Objective: Minimize costs rather than maximize utilities I Defender Cost Function: JD (aA , aD , P) = (10) γ(aA )T PQ̄aD | {z } false alarm + (aD )T diag(α)aD | {z } cost of defense + cD (QaA − Q̄aD ) | {z } cost of attack I Attacker Cost Function: JA (aA , aD , P) = (11) − γ(aA )T PQ̄aD | {z } detected + (aA )T diag(β)aA | {z } cost of attack + cA (Q̄aD − QaA ) | {z } gain of attack I Summary: Continuous-kernel general-sum game with strictly convex cost functions.
  • 28. 12/25 Continuous-Kernel Game Model (3/3) I Objective: Minimize costs rather than maximize utilities I Defender Cost Function: JD (aA , aD , P) = (12) γ(aA )T PQ̄aD | {z } false alarm + (aD )T diag(α)aD | {z } cost of defense + cD (QaA − Q̄aD ) | {z } cost of attack I Attacker Cost Function: JA (aA , aD , P) = (13) − γ(aA )T PQ̄aD | {z } detected + (aA )T diag(β)aA | {z } cost of attack + cA (Q̄aD − QaA ) | {z } gain of attack I Summary: Continuous-kernel general-sum game with convex cost functions.
  • 29. 13/25 Equilibrium Analysis (1/3) I Since JA, JD are strictly convex, the best-response correspondences are obtained from the first order conditions: I ∇aD (JD (aA , aD , P)) = 0 (14) ∇aD (γ(aA )T PQ̄aD + (aD )T diag(α)aD + cD (QaA − Q̄aD )) = 0 γ(aA )T PQ̄ + (aD )T (2diag(α)) − cD Q̄ = 0 =⇒ BrD(aA , P) = {cD Q̄(2diag(α))−1 − γ(2diag(α))−1 Q̄T PT aA } and, analogously for the attacker: ∇aA (JD (aA , aD , P)) = 0 (15) − γPQ̄aD + (aA )T (2diag(β)) − cA Q = 0 aA = (2diag(β))−1 cA Q + γ(2diag(β))−1 PQ̄aD =⇒ BrA(aD , P) = {(2diag(β))−1 cA Q + γ(2diag(β))−1 PQ̄aD }
  • 30. 13/25 Equilibrium Analysis (1/3) I Since JA, JD are strictly convex, the best-response correspondences are obtained from the first order conditions: ∇aD (JD (aA , aD , P)) = 0 (16) ∇aD (γ(aA )T PQ̄aD + (aD )T diag(α)aD + cD (QaA − Q̄aD )) = 0 γ(aA )T PQ̄ + (aD )T (2diag(α)) − cD Q̄ = 0 =⇒ BrD(aA , P) = {cD Q̄(2diag(α))−1 − γ(2diag(α))−1 Q̄T PT aA } I and, analogously for the attacker: ∇aA (JD (aA , aD , P)) = 0 (17) − γPQ̄aD + (aA )T (2diag(β)) − cA Q = 0 aA = (2diag(β))−1 cA Q + γ(2diag(β))−1 PQ̄aD =⇒ BrA(aD , P) = {(2diag(β))−1 cA Q + γ(2diag(β))−1 PQ̄aD }
  • 31. 13/25 Equilibrium Analysis (1/3) I Since JA, JD are strictly convex, the best-response correspondences are obtained from the first order conditions: ∇aD (JD (aA , aD , P)) = 0 (18) ∇aD (γ(aA )T PQ̄aD + (aD )T diag(α)aD + cD (QaA − Q̄aD )) = 0 γ(aA )T PQ̄ + (aD )T (2diag(α)) − cD Q̄ = 0 =⇒ BrD(aA , P) = {cD Q̄(2diag(α))−1 − γ(2diag(α))−1 Q̄T PT aA } and, analogously for the attacker: ∇aA (JD (aA , aD , P)) = 0 (19) − γPQ̄aD + (aA )T (2diag(β)) − cA Q = 0 aA = (2diag(β))−1 cA Q + γ(2diag(β))−1 PQ̄aD =⇒ BrA(aD , P) = {(2diag(β))−1 cA Q + γ(2diag(β))−1 PQ̄aD }
  • 32. 14/25 Equilibrium Analysis (2/3) I For notational convenience, define θD (cD Q̄, α) , [(cD Q̄)1/(2α1), . . . , (cD Q̄)Dmax /(2αDmax )] θA (cA Q, β) , [(cA Q)1/(2β1), . . . , (cA Q)Amax /(2βAmax )] I Then we can write the best response functions as: BrD(aA , P) = [θD − γ(diag(2α))−1 Q̄T PT aA ]+ BrA(aD , P) = [θA + γ(diag(2β))−1 PQ̄aD ]+ I The set of Nash equilibria is {(aA , aD ) | aA ∈ BrA(aD , P), aD ∈ BrD(aA , P)} (20) I How large is this set? What do the elements of this set look like?
  • 33. 15/25 Equilibrium Analysis (3/3) I For notational convenience, define θD (cD Q̄, α) , [(cD Q̄)1/(2α1), . . . , (cD Q̄)Dmax /(2αDmax )] θA (cA Q, β) , [(cA Q)1/(2β1), . . . , (cA Q)Amax /(2βAmax )] I Then we can write the best response functions as: BrD(aA , P) = [θD − γ(diag(2α))−1 Q̄T PT aA ]+ BrA(aD , P) = [θA + γ(diag(2β))−1 PQ̄aD ]+ I The set of Nash equilibria is {(aA , aD ) | aA ∈ BrA(aD , P), aD ∈ BrD(aA , P)} (21) I How large is this set? What do the elements of this set look like?
  • 34. 16/25 Main Contribution of the Paper Theorem There exists a unique NE. Further, if: γ < (22) min " mini θD maxi (diag(2α))−1Q̄T PT θA , maxi θA maxi (diag(2β))−1(−P)Q̄θD # Then the unique NE (aD∗, aA∗) satisfy aD,∗ > 0 and aA,∗ > 0 and is given by: aA∗ = (I + Z)−1 [θA + γ(diag(2β))−1 PQ̄θD ] (23) aD∗ = (I + Z̄)−1 [θD − γ(diag(2α))−1 Q̄T PT θA ] (24) where Z , γ2(diag(2β))−1PQ̄(diag(2α))−1Q̄T PT and Z̄ , γ2(diag(2α))−1Q̄T PT (diag(2β))−1PQ̄.
  • 35. 17/25 Rosen’s Existence Theorem23 Theorem (Pure Nash Equilibrium Existence for Continuous-Kernel Games) For each player i ∈ N, let Ai be a compact and convex subset of a finite-dimensional Euclidean space, and the cost functional Ji : A1 × . . . × AN → R be jointly continuous in all its arguments and strictly convex in ai for every aj ∈ Aj, j ∈ N, j 6= i. Then, the associated N-person nonzero-sum game admits a Nash equilibrium in pure strategies. 2 T. Başar and G.J. Olsder. Dynamic Noncooperative Game Theory. Classics in Applied Mathematics. Society for Industrial and Applied Mathematics, 1999. isbn: 9780898714296. url: https://books.google.se/books?id=k1oF5AxmJlYC. 3 J. B. Rosen. “Existence and Uniqueness of Equilibrium Points for Concave N-Person Games”. In: Econometrica 33.3 (1965), pp. 520–534. issn: 00129682, 14680262. url: http://www.jstor.org/stable/1911749.
  • 36. 18/25 Proof of Theorem 1, Existence I Existence of Pure NE: I AA , AD are convex subsets of a Euclidean space I JA , JD are jointly continuous in all their arguments and strictly convex in aA , aD respectively, I AA , AD are not compact. I However, JD (aA , aD , P) and JA (aA , aD , P) grow unbounded as |a| → ∞ I =⇒ by Rosen’s existence theorem, the game has a pure Nash equilibrium.
  • 37. 18/25 Proof of Theorem 1, Existence I Existence of Pure NE: I AA , AD are convex subsets of a Euclidean space I JA , JD are jointly continuous in all their arguments and strictly convex in aA , aD respectively, I AA , AD are not compact. I However, JD (aA , aD , P) and JA (aA , aD , P) grow unbounded as |a| → ∞ I =⇒ by Rosen’s existence theorem, the game has a pure Nash equilibrium.
  • 38. 18/25 Proof of Theorem 1, Existence I Existence of Pure NE: I AA , AD are convex subsets of a Euclidean space I JA , JD are jointly continuous in all their arguments and strictly convex in aA , aD respectively, I AA , AD are not compact. I However, JD (aA , aD , P) and JA (aA , aD , P) grow unbounded as |a| → ∞ I =⇒ by Rosen’s existence theorem, the game has a pure Nash equilibrium.
  • 39. 19/25 Rosen’s Uniqueness Theorem (1/3) - Pseudo-gradient4 Definition (Pseudo-Gradient g(a) and Pseudo-Gradient Operator ¯ ∇) Let ¯ ∇ be the pseudo-gradient operator, defined through its application on the cost vector J as: ¯ ∇J ,         ∂J1(a) ∂a1 ∂J2(a) ∂a2 . . . ∂J|N|(a) ∂a|N|         = g(a) (25) 4 J. B. Rosen. “Existence and Uniqueness of Equilibrium Points for Concave N-Person Games”. In: Econometrica 33.3 (1965), pp. 520–534. issn: 00129682, 14680262. url: http://www.jstor.org/stable/1911749.
  • 40. 20/25 Proof Preliminaries (2/3) - Pseudo-Hessian5 Definition (Pseudo-Hessian) Let G(a) be the Jacobian of the pseudo-gradient g(a) with respect to a (also called pseudo-Hessian): G(a) ,       ∂2J1(a) ∂a2 1 ∂2J1(a) ∂a1∂a2 . . . ∂2J1(a) ∂a1∂a|N| . . . ... . . . ∂2J|N|(a) ∂a|N|∂a1 ∂2J|N|(a) ∂a|N|∂a2 . . . ∂2J|N|(a) ∂a2 |N|       (26) Definition (Symmetrized Pseudo-Hessian) Let G(a) be the Jacobian of the pseudo-gradient g(a) with respect to a, i.e. the pseudo-Hessian, then the symmetrized pseudo-hessian is defined as: G(a) , G(a) + G(a)T (27)
  • 41. 21/25 Proof Preliminaries (3/3) - Rosen’s Uniqueness Theorem6 Theorem (Unique Pure Nash Equilibrium Existence for Continuous-Kernel Games) If the symmetrized pseudo-Hessian G(a) is positive definite, the pure equilibrium of a continuous-kernel game with strictly convex cost functions is unique. 6 J. B. Rosen. “Existence and Uniqueness of Equilibrium Points for Concave N-Person Games”. In: Econometrica 33.3 (1965), pp. 520–534. issn: 00129682, 14680262. url: http://www.jstor.org/stable/1911749.
  • 42. 22/25 Proof of Theorem 1, Uniqueness The pseudo-gradient is: ¯ ∇J(a) = h (γ(aA )T PQ̄)1 + (aD )T (2α1) − (cD Q̄)1 . . . (γ(aA )T PQ̄)Dmax + (aD )T (2αDmax ) − (cD Q̄)Dmax −(γPQ̄aD )1 + (aA )T (2β1) − (cA Q)1 . . . −(γPQ̄aD )Amax + (aA )T (2βAmax ) − (cA Q)Amax i (28)
  • 43. 22/25 Proof of Theorem 1, Uniqueness The pseudo-gradient is: ¯ ∇J(a) = h (γ(aA )T PQ̄)1 + (aD )T (2α1) − (cD Q̄)1 . . . (γ(aA )T PQ̄)Dmax + (aD )T (2αDmax ) − (cD Q̄)Dmax −(γPQ̄aD )1 + (aA )T (2β1) − (cA Q)1 . . . −(γPQ̄aD )Amax + (aA )T (2βAmax ) − (cA Q)Amax i (29) The pseudo-hessian is: G(a) =              2α1 0 0 | 0 ... 0 | γPQ̄ 0 0 2αDmax | — — — | — — — | 2β1 0 0 −γPQ̄ | 0 ... 0 | 0 0 2βAmax              (30)
  • 44. 22/25 Proof of Theorem 1, Uniqueness The pseudo-gradient is: ¯ ∇J(a) = h (γ(aA )T PQ̄)1 + (aD )T (2α1) − (cD Q̄)1 . . . (γ(aA )T PQ̄)Dmax + (aD )T (2αDmax ) − (cD Q̄)Dmax −(γPQ̄aD )1 + (aA )T (2β1) − (cA Q)1 . . . −(γPQ̄aD )Amax + (aA )T (2βAmax ) − (cA Q)Amax i (31) The pseudo-hessian is: G(a) =              2α1 0 0 | 0 ... 0 | γPQ̄ 0 0 2αDmax | — — — | — — — | 2β1 0 0 −γPQ̄ | 0 ... 0 | 0 0 2βAmax              (32) Clearly, G(a) = G(a) + G(a)T = 4diag([α, β]T ), which is positive definite.
  • 45. 22/25 Proof of Theorem 1, Uniqueness The pseudo-gradient is: ¯ ∇J(a) = h (γ(aA )T PQ̄)1 + (aD )T (2α1) − (cD Q̄)1 . . . (γ(aA )T PQ̄)Dmax + (aD )T (2αDmax ) − (cD Q̄)Dmax −(γPQ̄aD )1 + (aA )T (2β1) − (cA Q)1 . . . −(γPQ̄aD )Amax + (aA )T (2βAmax ) − (cA Q)Amax i (33) The pseudo-hessian is: G(a) =              2α1 0 0 | 0 ... 0 | γPQ̄ 0 0 2αDmax | — — — | — — — | 2β1 0 0 −γPQ̄ | 0 ... 0 z | 0 0 2βAmax              (34) Clearly, G(a) = G(a) + G(a)T = 4diag([α, β]T ), which is positive definite. Thus, by Rosen’s Uniqueness theorem, the NE is unique
  • 46. 23/25 Proof of Theorem 1, Analytical Characterization of NE Recall the Best Response Functions: BrD(aA , P) = [θD − γ(diag(2α))−1 Q̄T PT aA ]+ BrA(aD , P) = [θA + γ(diag(2β))−1 PQ̄aD ]+
  • 47. 23/25 Proof of Theorem 1, Analytical Characterization of NE Recall the Best Response Functions: BrD(aA , P) = [θD − γ(diag(2α))−1 Q̄T PT aA ]+ BrA(aD , P) = [θA + γ(diag(2β))−1 PQ̄aD ]+ Substitute aD in BrA(aD, P) with BrD(aA, P), we then obtain the fixed point equation: aA∗ = BrA(BrD(aA∗ , P), P) = [θA + γ(diag(2β))−1 PQ̄[θD − γ(diag(2α))−1 Q̄T PT aA∗ ]+ ]+
  • 48. 23/25 Proof of Theorem 1, Analytical Characterization of NE Recall the Best Response Functions: BrD(aA , P) = [θD − γ(diag(2α))−1 Q̄T PT aA ]+ BrA(aD , P) = [θA + γ(diag(2β))−1 PQ̄aD ]+ Substitute aD in BrA(aD, P) with BrD(aA, P), we then obtain the fixed point equation: aA∗ = BrA(BrD(aA∗ , P), P) = [θA + γ(diag(2β))−1 PQ̄[θD − γ(diag(2α))−1 Q̄T PT aA∗ ]+ ]+ Solving for aA∗ and similarly for aD∗ yields: aA∗ = (I + Z)−1 [θA + γ(diag(2β))−1 PQ̄θD ] (35) aD∗ = (I + Z̄)−1 [θD − γ(diag(2α))−1 Q̄T PT θA ] (36)
  • 49. 24/25 Conclusion I Topic: I The paper provides a game theoretic analysis of intrusion detection I Contributions: I A finite extensive form non-cooperative game model I A infinite continuous-kernel strategic non-cooperative game model I Existence and uniqueness proof of NE I Repeated game simulation
  • 50. 25/25 Discussion I General questions/Comments? I Are there other existence/uniqueness theorems that could have been used? I Are cyber attacks continuous? I The continuous-kernel model provide a richer analytical analysis I But, does it make sense in practice? I Which Model makes most sense: I Finite game model with NE in mixed strategies I Infinite game model with NE in pure strategies