Hypothesis Testing Game for Cyber Deception

Deception is a technique to mislead human or computer systems by manipulating beliefs and information. Successful deception is characterized by the information-asymmetric, dynamic, and strategic behaviors of the deceiver and the deceivee. This paper proposes a game-theoretic framework to capture these features of deception in which the deceiver sends the strategically manipulated information to the deceivee while the deceivee makes the best-effort decisions based on the information received and his belief. In particular, we consider the case when the deceivee adopts hypothesis testing to make binary decisions and the asymmetric information is modeled using a signaling game where the deceiver is a privately-informed player called sender and the deceivee is an uninformed player called receiver. We characterize perfect Bayesian Nash equilibrium (PBNE) solution of the game and study the deceivability of the game. Our results show that the hypothesis testing game admits pooling and partially-separating-pooling equilibria. In pooling equilibria, the deceivability depends on the true types, while in partially-separating-pooling equilibria, the deceivability depends on the cost of the deceiver. We introduce the receiver operating characteristic curve to visualize the equilibrium behavior of the deceiver and the performance of the decision making, thereby characterizing the deceivability of the hypothesis testing game.

[1]  J. Sobel,et al.  STRATEGIC INFORMATION TRANSMISSION , 1982 .

[2]  Uri Gneezy,et al.  Deception: The Role of Consequences , 2005 .

[3]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[4]  Quanyan Zhu,et al.  Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles , 2017, GameSec.

[5]  Ray Bull,et al.  Increasing Cognitive Load to Facilitate Lie Detection: The Benefit of Recalling an Event in Reverse Order , 2008, Law and human behavior.

[6]  Navin Kartik,et al.  Strategic Communication with Lying Costs , 2009 .

[7]  Paul R. Milgrom,et al.  Good News and Bad News: Representation Theorems and Applications , 1981 .

[8]  Philippe Jehiel,et al.  A theory of deception , 2010 .

[9]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Lech J. Janczewski,et al.  Cyber Warfare and Cyber Terrorism , 2007 .

[11]  H. B. Cott,et al.  Adaptive Coloration in Animals , 1940 .

[12]  Sanford J. Grossman The Informational Role of Warranties and Private Disclosure about Product Quality , 1981, The Journal of Law and Economics.

[13]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[14]  Bernard C. Levy,et al.  Principles of Signal Detection and Parameter Estimation , 2008 .