Cyber security based on mean field game model of the defender: Attacker strategies

The transmission process of information among computers of network is considered as the procedure of interactive behaviors. In this article, we present a mean field game model for the binary interactive behaviors between the malicious attackers and the defenders. We first discuss the evolution of the states of the malicious attackers and the defenders using the susceptiable-infective-Removal epidemic model in which we take into account the stochastic process of the propagation of the infected computers and the attack intensity. Then, we formulate the mean field game consistency stability problem generated by a Hamilton–Jacobi–Bellman equation of the individual player and the fixed-point problem. Finally, we derive the optimal individual strategy with an appropriate assumption that the response time of the defense system is faster than the infection rate.

[1]  Hamidou Tembine,et al.  Mean-field-type games , 2017 .

[2]  Peter E. Caines,et al.  Large population stochastic dynamic games: closed-loop McKean-Vlasov systems and the Nash certainty equivalence principle , 2006, Commun. Inf. Syst..

[3]  Peng Liu,et al.  Using full duplex relaying in device-to-device (D2D) based wireless multicast services: a two-user case , 2014, Science China Information Sciences.

[4]  Harry Eugene Stanley,et al.  Robustness of interdependent networks under targeted attack , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  D. Gomes,et al.  Continuous Time Finite State Mean Field Games , 2012, 1203.3173.

[6]  Hamidou Tembine,et al.  Noisy mean field stochastic games with network applications , 2010 .

[7]  Hamidou Tembine,et al.  Opinion Dynamics in Social Networks through Mean-Field Games , 2016, SIAM J. Control. Optim..

[8]  Quanyan Zhu,et al.  A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.

[9]  Detlof von Winterfeldt,et al.  A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users , 2015, STM.

[10]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[11]  Wei Jiang,et al.  A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[12]  Tansu Alpcan,et al.  Network Security , 2010 .

[13]  Sankardas Roy,et al.  A game inspired defense mechanism against distributed denial of service attacks , 2014, Secur. Commun. Networks.

[14]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[15]  Samson Lasaulce,et al.  Mean field energy games in wireless networks , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[16]  P. Lions,et al.  Jeux à champ moyen. I – Le cas stationnaire , 2006 .

[17]  Olivier Guéant,et al.  Mean Field Games and Applications , 2011 .

[18]  Abdullahi Chowdhury Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview , 2016, ATIS.

[19]  D. Gomes,et al.  Discrete Time, Finite State Space Mean Field Games , 2010 .

[20]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[21]  Eitan Altman,et al.  Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[22]  V. Kolokoltsov Nonlinear Markov Games on a Finite State Space (Mean-field and Binary Interactions) , 2012 .

[23]  Vassili N. Kolokoltsov,et al.  Corruption and botnet defense: a mean field game approach , 2016, Int. J. Game Theory.