EBOOK - Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park (Full)



This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually

The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.



Contents


Machine Learning and Security

Distributed Generative Adversarial Networks for Anomaly Detection. . . . . . . 3

Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie,

and Justin Kopacz

Learning and Planning in the Feature Deception Problem. . . . . . . . . . . . . . . 23

Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan,

Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie,

Charles Kamhoua, and Fei Fang

A Realistic Approach for Network Traffic Obfuscation Using Adversarial

Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz,

and Christopher Kiekintveld

Adversarial Deep Reinforcement Learning Based Adaptive Moving Target

Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Taha Eghtesad, Yevgeniy Vorobeychik, and Aron Laszka

Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception

Game of Questionable Veracity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Mark Bilinski, Joe diVita, Kimberly Ferguson-Walter, Sunny Fugate,

Ryan Gabrys, Justin Mauger, and Brian Souza

Cyber Deception

Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games . . . 103

Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez,

Milind Tambe, and Phebe Vayanos

Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive

Honeypots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Linan Huang and Quanyan Zhu

Harnessing the Power of Deception in Attack Graph-Based

Security Games. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan,

Nandi O. Leslie, Charles Kamhoua, and Fei Fang

Decoy Allocation Games on Graphs with Temporal Logic Objectives . . . . . . 168

Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua,

and Nandi O. Leslie

Popular Imperceptibility Measures in Visual Adversarial Attacks are Far

from Human Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

Ayon Sen, Xiaojin Zhu, Erin Marshall, and Robert Nowak

Cyber-Physical System Security

Secure Discrete-Time Linear-Quadratic Mean-Field Games. . . . . . . . . . . . . . 203

Muhammad Aneeq uz Zaman, Sujay Bhatt, and Tamer Başar

Detection of Dynamically Changing Leaders in Complex Swarms

from Observed Dynamic Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

Christos N. Mavridis, Nilesh Suriyarachchi, and John S. Baras

Moving Target Defense for Robust Monitoring of Electric Grid

Transformers in Adversarial Environments . . . . . . . . . . . . . . . . . . . . . . . . . 241

Sailik Sengupta, Kaustav Basu, Arunabha Sen,

and Subbarao Kambhampati

Security of Network Systems

Blocking Adversarial Influence in Social Networks . . . . . . . . . . . . . . . . . . . 257

Feiran Jia, Kai Zhou, Charles Kamhoua, and Yevgeniy Vorobeychik

Normalizing Flow Policies for Multi-agent Systems. . . . . . . . . . . . . . . . . . . 277

Xiaobai Ma, Jayesh K. Gupta, and Mykel J. Kochenderfer

A Game Theoretic Framework for Software Diversity

for Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Ahmed H. Anwar, Nandi O. Leslie, Charles Kamhoua,

and Christopher Kiekintveld

Partially Observable Stochastic Games for Cyber Deception Against

Network Epidemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312

Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua,

and Gabriel Deugoue

Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber

Supply Chain Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

Yuhan Zhao and Quanyan Zhu

x Contents

Theoretic Foundations of Security Games

On the Characterization of Saddle Point Equilibrium for Security Games

with Additive Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349

Hamid Emadi and Sourabh Bhattacharya

MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation . . . . . 365

Yunian Pan, Guanze Peng, Juntao Chen, and Quanyan Zhu

Using One-Sided Partially Observable Stochastic Games

for Solving Zero-Sum Security Games with Sequential Attacks. . . . . . . . . . . 385

Petr Tomášek, Branislav Bošanský, and Thanh H. Nguyen

A Data-Driven Distributionally Robust Game Using Wasserstein Distance . . . 405

Guanze Peng, Tao Zhang, and Quanyan Zhu

Security Games over Lexicographic Orders . . . . . . . . . . . . . . . . . . . . . . . . 422

Stefan Rass, Angelika Wiegele, and Sandra König

Emerging Topics

Game Theory on Attack Graph for Cyber Deception . . . . . . . . . . . . . . . . . . 445

Ahmed H. Anwar and Charles Kamhoua

Attacking Machine Learning Models for Social Good . . . . . . . . . . . . . . . . . 457

Vibha Belavadi, Yan Zhou, Murat Kantarcioglu,

and Bhavani Thuriasingham

A Review of Multi Agent Perimeter Defense Games . . . . . . . . . . . . . . . . . . 472

Daigo Shishika and Vijay Kumar

Hardware Security and Trust: A New Battlefield of Information . . . . . . . . . . 486

Gang Qu

Security Games with Insider Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

Derya Cansever

Securing Next-Generation Wireless Networks: Challenges

and Opportunities (Extended Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

Alex Sprintson

Short Paper

A Data Mining Friendly Anonymization Scheme for System Logs Using

Distance Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

Gabriela Limonta and Yoan Miche

Author Index








LINK DOWNLOAD (TÀI LIỆU VIP MEMBER)



This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually

The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.



Contents


Machine Learning and Security

Distributed Generative Adversarial Networks for Anomaly Detection. . . . . . . 3

Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie,

and Justin Kopacz

Learning and Planning in the Feature Deception Problem. . . . . . . . . . . . . . . 23

Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan,

Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie,

Charles Kamhoua, and Fei Fang

A Realistic Approach for Network Traffic Obfuscation Using Adversarial

Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz,

and Christopher Kiekintveld

Adversarial Deep Reinforcement Learning Based Adaptive Moving Target

Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Taha Eghtesad, Yevgeniy Vorobeychik, and Aron Laszka

Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception

Game of Questionable Veracity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Mark Bilinski, Joe diVita, Kimberly Ferguson-Walter, Sunny Fugate,

Ryan Gabrys, Justin Mauger, and Brian Souza

Cyber Deception

Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games . . . 103

Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez,

Milind Tambe, and Phebe Vayanos

Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive

Honeypots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Linan Huang and Quanyan Zhu

Harnessing the Power of Deception in Attack Graph-Based

Security Games. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan,

Nandi O. Leslie, Charles Kamhoua, and Fei Fang

Decoy Allocation Games on Graphs with Temporal Logic Objectives . . . . . . 168

Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua,

and Nandi O. Leslie

Popular Imperceptibility Measures in Visual Adversarial Attacks are Far

from Human Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

Ayon Sen, Xiaojin Zhu, Erin Marshall, and Robert Nowak

Cyber-Physical System Security

Secure Discrete-Time Linear-Quadratic Mean-Field Games. . . . . . . . . . . . . . 203

Muhammad Aneeq uz Zaman, Sujay Bhatt, and Tamer Başar

Detection of Dynamically Changing Leaders in Complex Swarms

from Observed Dynamic Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

Christos N. Mavridis, Nilesh Suriyarachchi, and John S. Baras

Moving Target Defense for Robust Monitoring of Electric Grid

Transformers in Adversarial Environments . . . . . . . . . . . . . . . . . . . . . . . . . 241

Sailik Sengupta, Kaustav Basu, Arunabha Sen,

and Subbarao Kambhampati

Security of Network Systems

Blocking Adversarial Influence in Social Networks . . . . . . . . . . . . . . . . . . . 257

Feiran Jia, Kai Zhou, Charles Kamhoua, and Yevgeniy Vorobeychik

Normalizing Flow Policies for Multi-agent Systems. . . . . . . . . . . . . . . . . . . 277

Xiaobai Ma, Jayesh K. Gupta, and Mykel J. Kochenderfer

A Game Theoretic Framework for Software Diversity

for Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Ahmed H. Anwar, Nandi O. Leslie, Charles Kamhoua,

and Christopher Kiekintveld

Partially Observable Stochastic Games for Cyber Deception Against

Network Epidemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312

Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua,

and Gabriel Deugoue

Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber

Supply Chain Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

Yuhan Zhao and Quanyan Zhu

x Contents

Theoretic Foundations of Security Games

On the Characterization of Saddle Point Equilibrium for Security Games

with Additive Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349

Hamid Emadi and Sourabh Bhattacharya

MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation . . . . . 365

Yunian Pan, Guanze Peng, Juntao Chen, and Quanyan Zhu

Using One-Sided Partially Observable Stochastic Games

for Solving Zero-Sum Security Games with Sequential Attacks. . . . . . . . . . . 385

Petr Tomášek, Branislav Bošanský, and Thanh H. Nguyen

A Data-Driven Distributionally Robust Game Using Wasserstein Distance . . . 405

Guanze Peng, Tao Zhang, and Quanyan Zhu

Security Games over Lexicographic Orders . . . . . . . . . . . . . . . . . . . . . . . . 422

Stefan Rass, Angelika Wiegele, and Sandra König

Emerging Topics

Game Theory on Attack Graph for Cyber Deception . . . . . . . . . . . . . . . . . . 445

Ahmed H. Anwar and Charles Kamhoua

Attacking Machine Learning Models for Social Good . . . . . . . . . . . . . . . . . 457

Vibha Belavadi, Yan Zhou, Murat Kantarcioglu,

and Bhavani Thuriasingham

A Review of Multi Agent Perimeter Defense Games . . . . . . . . . . . . . . . . . . 472

Daigo Shishika and Vijay Kumar

Hardware Security and Trust: A New Battlefield of Information . . . . . . . . . . 486

Gang Qu

Security Games with Insider Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

Derya Cansever

Securing Next-Generation Wireless Networks: Challenges

and Opportunities (Extended Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

Alex Sprintson

Short Paper

A Data Mining Friendly Anonymization Scheme for System Logs Using

Distance Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

Gabriela Limonta and Yoan Miche

Author Index








LINK DOWNLOAD (TÀI LIỆU VIP MEMBER)

M_tả
M_tả

Chuyên mục:

Không có nhận xét nào: