Modeling and Analysis of Deception Games Based on Hypergame Theory

In this chapter, we discuss a deception game where attackers and defenders can have different perceptions towards a given situation. Although existing game theories have considered incomplete information to consider uncertainty, how players’ different perceptions or misperceptions can affect their decision-making has not been fully addressed. In particular, we discuss hypergame theory which has been used to resolve conflicts under uncertainty. In this chapter, we examine how a player’s perception (or misperception) affects their decision-making in choosing a best strategy based on hypergame theory. To deliver a concrete idea on how the attack–defense game can be modeled based on hypergame theory, we model a simple cybergame scenario and demonstrate an example probability model using Stochastic Petri Nets. Through the evaluation of the model, we show the experimental results to deliver insightful findings in terms of the relationships between perceptions by different players (i.e., an attacker or a defender), their chosen best strategies, and corresponding utilities. Lastly, we measure performance of the attacker and the defender in terms of attack success probability and mean time to security failure.

[1]  Stefan Rass,et al.  Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.

[2]  Prasant Mohapatra,et al.  Stealthy attacks meets insider threats: A three-player game model , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[3]  George Cybenko,et al.  Hypergame theory applied to cyber attack and defense , 2010, Defense + Commercial Sensing.

[4]  Lidong Zhai,et al.  A Game Model for Predicting the Attack Path of APT , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[5]  Gary B. Lamont,et al.  Hypergame Theory: A Model for Conflict, Misperception, and Deception , 2015 .

[6]  Liang Xiao,et al.  Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage , 2017, IEEE Access.

[7]  Yasuo Sasaki,et al.  Subjective Rationalizability in Hypergames , 2014, Adv. Decis. Sci..

[8]  Ming Zhang,et al.  A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources , 2015, GameSec.

[9]  N. Garg,et al.  Deception in Honeynets: A Game-Theoretic Analysis , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[10]  Bahman Gharesifard,et al.  Evolution of the perception about the opponent in hypergames , 2010, 49th IEEE Conference on Decision and Control (CDC).

[11]  J. Bowyer Bell,et al.  Cheating and Deception , 1991 .

[12]  Keith W. Hipel,et al.  First-Level Hypergame for Investigating Misperception in Conflicts , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[13]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[14]  Steven Tadelis Game theory : an introduction , 2013 .

[15]  Luis G. Vargas Conflict analysis: Models and resolutions: Niall M. FRASER and Keith W. HIPEL Volume 11 in: North-Holland Series in System Science and Engineering, North-Holland, New York, 1984, xx + 377 pages, $34.50 , 1985 .

[16]  Russell R. Vane Hypergame Theory for DTGT Agents , 2000 .

[17]  Prasant Mohapatra,et al.  Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[18]  Russell R. Vane Planning for terrorist-caused emergencies , 2005, Proceedings of the Winter Simulation Conference, 2005..

[19]  Felix C. Gaertner Byzantine Failures and Security: Arbitrary is not (always) Random , 2003 .

[20]  Kyoichi Kijima,et al.  Adaptive learning of hypergame situations using a genetic algorithm , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[21]  Tatsushi Yamasaki,et al.  Replicator Dynamics of Evolutionary Hypergames , 2003, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[22]  Ping Chen,et al.  A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.

[23]  Ananthram Swami,et al.  A Survey on Modeling and Optimizing Multi-Objective Systems , 2017, IEEE Communications Surveys & Tutorials.

[24]  P. Bennett,et al.  Toward a theory of hypergames , 1977 .

[25]  Bahman Gharesifard,et al.  Evolution of Players' Misperceptions in Hypergames Under Perfect Observations , 2012, IEEE Transactions on Automatic Control.

[26]  Joseph W Caddell Deception 101 - Primer on Deception , 2004 .

[27]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[28]  Donald C. Daniel,et al.  Strategic military deception , 1982 .