Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models11Part of the results included in this chapter was presented in [1] and [2].

Modeling adversarial threat is a major concern on studying infrastructure security involving autonomous entities. In this chapter, we depart from the perspective of game theory and propose intent-based adversary model – that is, formulating an adversary's intent as combining the intent to obtain more accurate results with compromising other entities' private information. We then explain basic concepts of game theory and its taxonomy. Finally, we discuss two important infrastructure security applications: anomaly detection and anonymous communication.

[1]  Alexander Liu,et al.  AI Lessons Learned from Experiments in Insider Threat Detection , 2006, AAAI Spring Symposium: What Went Wrong and Why: Lessons from AI Research and Applications.

[2]  B. Karp,et al.  Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.

[3]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[4]  Lawrence A. Gordon,et al.  Using information security as a response to competitor analysis systems , 2001, CACM.

[5]  Sajal K. Das,et al.  gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity , 2010, GameSec.

[6]  Wei Zhao,et al.  Privacy-Preserving Data Mining Systems , 2007, Computer.

[7]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2005, ACM Trans. Inf. Syst. Secur..

[8]  Sajal K. Das,et al.  Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[9]  A. Liu,et al.  A comparison of system call feature representations for insider threat detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[10]  Gregory Stephens,et al.  Statistical profiling and visualization for detection of malicious insider attacks on computer networks , 2004, VizSEC/DMSEC '04.

[11]  K. J. Ray Liu,et al.  Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[12]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[13]  Wei Zhao,et al.  Distributed Privacy Preserving Information Sharing , 2005, VLDB.

[14]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.