EBOOK - Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park (Full)
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually
The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.
Contents
Machine Learning and Security
Distributed Generative Adversarial Networks for Anomaly Detection. . . . . . . 3
Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie,
and Justin Kopacz
Learning and Planning in the Feature Deception Problem. . . . . . . . . . . . . . . 23
Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan,
Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie,
Charles Kamhoua, and Fei Fang
A Realistic Approach for Network Traffic Obfuscation Using Adversarial
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz,
and Christopher Kiekintveld
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target
Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Taha Eghtesad, Yevgeniy Vorobeychik, and Aron Laszka
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception
Game of Questionable Veracity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Mark Bilinski, Joe diVita, Kimberly Ferguson-Walter, Sunny Fugate,
Ryan Gabrys, Justin Mauger, and Brian Souza
Cyber Deception
Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games . . . 103
Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez,
Milind Tambe, and Phebe Vayanos
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive
Honeypots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Linan Huang and Quanyan Zhu
Harnessing the Power of Deception in Attack Graph-Based
Security Games. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan,
Nandi O. Leslie, Charles Kamhoua, and Fei Fang
Decoy Allocation Games on Graphs with Temporal Logic Objectives . . . . . . 168
Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua,
and Nandi O. Leslie
Popular Imperceptibility Measures in Visual Adversarial Attacks are Far
from Human Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Ayon Sen, Xiaojin Zhu, Erin Marshall, and Robert Nowak
Cyber-Physical System Security
Secure Discrete-Time Linear-Quadratic Mean-Field Games. . . . . . . . . . . . . . 203
Muhammad Aneeq uz Zaman, Sujay Bhatt, and Tamer Başar
Detection of Dynamically Changing Leaders in Complex Swarms
from Observed Dynamic Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Christos N. Mavridis, Nilesh Suriyarachchi, and John S. Baras
Moving Target Defense for Robust Monitoring of Electric Grid
Transformers in Adversarial Environments . . . . . . . . . . . . . . . . . . . . . . . . . 241
Sailik Sengupta, Kaustav Basu, Arunabha Sen,
and Subbarao Kambhampati
Security of Network Systems
Blocking Adversarial Influence in Social Networks . . . . . . . . . . . . . . . . . . . 257
Feiran Jia, Kai Zhou, Charles Kamhoua, and Yevgeniy Vorobeychik
Normalizing Flow Policies for Multi-agent Systems. . . . . . . . . . . . . . . . . . . 277
Xiaobai Ma, Jayesh K. Gupta, and Mykel J. Kochenderfer
A Game Theoretic Framework for Software Diversity
for Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Ahmed H. Anwar, Nandi O. Leslie, Charles Kamhoua,
and Christopher Kiekintveld
Partially Observable Stochastic Games for Cyber Deception Against
Network Epidemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua,
and Gabriel Deugoue
Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber
Supply Chain Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Yuhan Zhao and Quanyan Zhu
x Contents
Theoretic Foundations of Security Games
On the Characterization of Saddle Point Equilibrium for Security Games
with Additive Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Hamid Emadi and Sourabh Bhattacharya
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation . . . . . 365
Yunian Pan, Guanze Peng, Juntao Chen, and Quanyan Zhu
Using One-Sided Partially Observable Stochastic Games
for Solving Zero-Sum Security Games with Sequential Attacks. . . . . . . . . . . 385
Petr Tomášek, Branislav Bošanský, and Thanh H. Nguyen
A Data-Driven Distributionally Robust Game Using Wasserstein Distance . . . 405
Guanze Peng, Tao Zhang, and Quanyan Zhu
Security Games over Lexicographic Orders . . . . . . . . . . . . . . . . . . . . . . . . 422
Stefan Rass, Angelika Wiegele, and Sandra König
Emerging Topics
Game Theory on Attack Graph for Cyber Deception . . . . . . . . . . . . . . . . . . 445
Ahmed H. Anwar and Charles Kamhoua
Attacking Machine Learning Models for Social Good . . . . . . . . . . . . . . . . . 457
Vibha Belavadi, Yan Zhou, Murat Kantarcioglu,
and Bhavani Thuriasingham
A Review of Multi Agent Perimeter Defense Games . . . . . . . . . . . . . . . . . . 472
Daigo Shishika and Vijay Kumar
Hardware Security and Trust: A New Battlefield of Information . . . . . . . . . . 486
Gang Qu
Security Games with Insider Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Derya Cansever
Securing Next-Generation Wireless Networks: Challenges
and Opportunities (Extended Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Alex Sprintson
Short Paper
A Data Mining Friendly Anonymization Scheme for System Logs Using
Distance Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Gabriela Limonta and Yoan Miche
Author Index
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually
The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.
Contents
Machine Learning and Security
Distributed Generative Adversarial Networks for Anomaly Detection. . . . . . . 3
Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie,
and Justin Kopacz
Learning and Planning in the Feature Deception Problem. . . . . . . . . . . . . . . 23
Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan,
Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie,
Charles Kamhoua, and Fei Fang
A Realistic Approach for Network Traffic Obfuscation Using Adversarial
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz,
and Christopher Kiekintveld
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target
Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Taha Eghtesad, Yevgeniy Vorobeychik, and Aron Laszka
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception
Game of Questionable Veracity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Mark Bilinski, Joe diVita, Kimberly Ferguson-Walter, Sunny Fugate,
Ryan Gabrys, Justin Mauger, and Brian Souza
Cyber Deception
Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games . . . 103
Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez,
Milind Tambe, and Phebe Vayanos
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive
Honeypots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Linan Huang and Quanyan Zhu
Harnessing the Power of Deception in Attack Graph-Based
Security Games. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan,
Nandi O. Leslie, Charles Kamhoua, and Fei Fang
Decoy Allocation Games on Graphs with Temporal Logic Objectives . . . . . . 168
Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua,
and Nandi O. Leslie
Popular Imperceptibility Measures in Visual Adversarial Attacks are Far
from Human Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Ayon Sen, Xiaojin Zhu, Erin Marshall, and Robert Nowak
Cyber-Physical System Security
Secure Discrete-Time Linear-Quadratic Mean-Field Games. . . . . . . . . . . . . . 203
Muhammad Aneeq uz Zaman, Sujay Bhatt, and Tamer Başar
Detection of Dynamically Changing Leaders in Complex Swarms
from Observed Dynamic Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Christos N. Mavridis, Nilesh Suriyarachchi, and John S. Baras
Moving Target Defense for Robust Monitoring of Electric Grid
Transformers in Adversarial Environments . . . . . . . . . . . . . . . . . . . . . . . . . 241
Sailik Sengupta, Kaustav Basu, Arunabha Sen,
and Subbarao Kambhampati
Security of Network Systems
Blocking Adversarial Influence in Social Networks . . . . . . . . . . . . . . . . . . . 257
Feiran Jia, Kai Zhou, Charles Kamhoua, and Yevgeniy Vorobeychik
Normalizing Flow Policies for Multi-agent Systems. . . . . . . . . . . . . . . . . . . 277
Xiaobai Ma, Jayesh K. Gupta, and Mykel J. Kochenderfer
A Game Theoretic Framework for Software Diversity
for Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Ahmed H. Anwar, Nandi O. Leslie, Charles Kamhoua,
and Christopher Kiekintveld
Partially Observable Stochastic Games for Cyber Deception Against
Network Epidemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua,
and Gabriel Deugoue
Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber
Supply Chain Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Yuhan Zhao and Quanyan Zhu
x Contents
Theoretic Foundations of Security Games
On the Characterization of Saddle Point Equilibrium for Security Games
with Additive Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Hamid Emadi and Sourabh Bhattacharya
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation . . . . . 365
Yunian Pan, Guanze Peng, Juntao Chen, and Quanyan Zhu
Using One-Sided Partially Observable Stochastic Games
for Solving Zero-Sum Security Games with Sequential Attacks. . . . . . . . . . . 385
Petr Tomášek, Branislav Bošanský, and Thanh H. Nguyen
A Data-Driven Distributionally Robust Game Using Wasserstein Distance . . . 405
Guanze Peng, Tao Zhang, and Quanyan Zhu
Security Games over Lexicographic Orders . . . . . . . . . . . . . . . . . . . . . . . . 422
Stefan Rass, Angelika Wiegele, and Sandra König
Emerging Topics
Game Theory on Attack Graph for Cyber Deception . . . . . . . . . . . . . . . . . . 445
Ahmed H. Anwar and Charles Kamhoua
Attacking Machine Learning Models for Social Good . . . . . . . . . . . . . . . . . 457
Vibha Belavadi, Yan Zhou, Murat Kantarcioglu,
and Bhavani Thuriasingham
A Review of Multi Agent Perimeter Defense Games . . . . . . . . . . . . . . . . . . 472
Daigo Shishika and Vijay Kumar
Hardware Security and Trust: A New Battlefield of Information . . . . . . . . . . 486
Gang Qu
Security Games with Insider Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Derya Cansever
Securing Next-Generation Wireless Networks: Challenges
and Opportunities (Extended Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Alex Sprintson
Short Paper
A Data Mining Friendly Anonymization Scheme for System Logs Using
Distance Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Gabriela Limonta and Yoan Miche
Author Index
Không có nhận xét nào: