Paper
3 May 2010 Hypergame theory applied to cyber attack and defense
James Thomas House, George Cybenko
Author Affiliations +
Abstract
This work concerns cyber attack and defense in the context of game theory—specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability—representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
James Thomas House and George Cybenko "Hypergame theory applied to cyber attack and defense", Proc. SPIE 7666, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX, 766604 (3 May 2010); https://doi.org/10.1117/12.852338
Lens.org Logo
CITATIONS
Cited by 15 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Defense and security

Homeland security

C3I

Current controlled current source

Defense technologies

Intelligent sensors

Machine learning

RELATED CONTENT

Maximizing PPV in C3I systems
Proceedings of SPIE (May 05 2017)
Decentralized sensing and tracking for UAV scheduling
Proceedings of SPIE (September 15 2004)
C3I standards for payload weaponry
Proceedings of SPIE (May 20 2005)
The Institute for Security Technology Studies (ISTS): overview
Proceedings of SPIE (September 15 2004)

Back to Top