On solving large-scale low-rank zero-sum security games of incomplete information

Zero-sum games are useful to model the strategic interactions between an attacker and a defender over a network. The computation of the equilibrium solutions become challenging when entries of the payoff matrix are either partially or completely unknown. The uncertainties of the game often arise from the error in the observations and the incomplete information on the structure of the game. In this work, we leverage low-rank features of the security games to establish a robust computational framework that enables to solve games of incomplete information and compute their security strategies. We characterize the upper and the lower security values of the games using two robust and convex optimization problems in which the players compute the worst-case strategies subject to their unknown. The robust framework is compared with the benchmark matrix completion approach in which saddle-point equilibrium strategies are computed after the matrix is completed using rank optimization. Our numerical results have shown that the strategy found by using the holistic robust optimization method can outperform the matrix completion method in the prediction of the attacker and defender strategies.

[1]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[2]  Sarah Granger,et al.  Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .

[3]  P. Whittle Risk-sensitive linear/quadratic/gaussian control , 1981, Advances in Applied Probability.

[4]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[5]  Andrea J. Goldsmith,et al.  Design challenges for energy-constrained ad hoc wireless networks , 2002, IEEE Wirel. Commun..

[6]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[7]  Emmanuel J. Candès,et al.  Exact Matrix Completion via Convex Optimization , 2008, Found. Comput. Math..

[8]  Arkadi Nemirovski,et al.  Robust optimization – methodology and applications , 2002, Math. Program..

[9]  R. Rockafellar,et al.  Optimization of conditional value-at risk , 2000 .

[10]  Massimo Fornasier,et al.  Compressive Sensing , 2015, Handbook of Mathematical Methods in Imaging.

[11]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[12]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[13]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[14]  Pablo A. Parrilo,et al.  Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization , 2007, SIAM Rev..

[15]  T. Basar,et al.  H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..

[16]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[17]  Zaiwen Wen,et al.  Robust linear optimization under matrix completion , 2014 .