Multi-dimensional Network Security Game: How do attacker and defender battle on parallel targets?

Yuedong Xu,John C.S. Lui
DOI: https://doi.org/10.48550/arXiv.2202.09755
2022-02-20
Abstract:In this paper, we consider a new network security game wherein an attacker and a defender are battling over "multiple" targets. This type of game is appropriate to model many current network security conflicts such as Internet phishing, mobile malware or network intrusions. In such attacks, the attacker and the defender need to decide how to allocate resources on each target so as to maximize his utility within his resource limit. We model such a multi-dimensional network security game as a constrained non-zero sum game. Two security breaching models, the product-form and the proportion-form, are considered. For each breaching model, we prove the existence of a unique Nash equilibrium (NE) based on Rosen's theorem and propose efficient algorithms to find the NE when the games are strictly concave. Furthermore, we show the existence of multiple NEs in the product-form breaching model when the strict concavity does not hold. Our study sheds light on the strategic behaviors of the attacker and the defender, in particular, on how they allocate resources to the targets which have different weights, and how their utilities as well as strategies are influenced by the resource constraints.
Computer Science and Game Theory
What problem does this paper attempt to address?
This paper attempts to solve the problem of resource allocation decisions between attackers and defenders on multiple targets in network security. Specifically, the paper focuses on a new type of network security game in which attackers and defenders compete on "multiple" targets. This type of game is suitable for modeling many current network security conflicts, such as phishing, mobile malware, or network intrusions. In these attacks, attackers and defenders need to decide how to allocate resources on each target in order to maximize their utility within resource limitations. The main contributions of the paper include: 1. Proposing a new multi - dimensional network security game framework that can simultaneously capture the competition between attackers and defenders on multiple targets. 2. For strictly concave objective functions, proposing efficient algorithms to find the unique Nash equilibrium (NE). 3. When the objective function is not strictly concave, proving that there are multiple Nash equilibria in the product - form destruction model. 4. Providing important insights into how attackers and defenders allocate resources to heterogeneous targets under resource constraints, and analyzing how resource constraints affect the Nash equilibrium. Through these studies, the paper reveals the strategic behavior of attackers and defenders in multi - target attacks, especially how they allocate resources according to the different values of the targets, and how their utility and strategies are affected by resource constraints.