Inverse game theory: learning the nature of a game through play

Real world adversarial dynamics such as those encountered in Computer and Network security require models which allow for both imperfect and incomplete information. Recently game theoretic models and specically signaling games have been at the forefront of interest for modeling these scenarios. We propose a modication of signaling games, a type of Bayesian game, which we believe can serve as a model for these scenarios. By incorporating real world data into the model, these games could allow interested parties to learn the true nature of the game that they are already playing - though without the rulebook.

[1]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[2]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[3]  Wei Jiang,et al.  A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[4]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, ICCCN.

[5]  Xuan Dau Hoang E-commerce security enhancement and anomaly intrusion detection using machine learning techniques , 2006 .

[6]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[7]  A. Patcha,et al.  A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[8]  John Langford,et al.  Correlated equilibria in graphical games , 2003, EC '03.

[9]  Bernhard Plattner,et al.  Modelling the Security Ecosystem- The Dynamics of (In)Security , 2009, WEIS.

[10]  George Cybenko,et al.  Exploiting Adversary's Risk Profiles in Imperfect Information Security Games , 2011, GameSec.

[11]  Tansu Alpcan,et al.  Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.

[12]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[13]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[14]  Dean P. Foster,et al.  Regret Testing: A Simple Payo-Based Procedure for Learning Nash Equilibrium , 2005 .