Location

Online

Event Website

https://hicss.hawaii.edu/

Start Date

3-1-2022 12:00 AM

End Date

7-1-2022 12:00 AM

Description

We consider a two-player network inspection game, in which a defender positions heterogeneous sensors according to a probability distribution in order to detect multiple attacks caused by a strategic attacker. We assume the defender has access to multiple types of sensors that can potentially differ in their accuracy. The objective of the defender (resp. attacker) is to minimize (resp. maximize) the expected number of undetected attacks. We derive a Nash equilibrium of this zero-sum game under the assumption that each component in the network can be monitored from a unique sensor location. We then leverage our constructed Nash equilibrium to provide approximate solutions to the general case by solving a minimum set cover problem. Our results illustrate the performance and computational advantage of our solution approach, as well as the value of strategically leveraging heterogeneous sensors to protect critical networks against attacks.

Share

COinS
 
Jan 3rd, 12:00 AM Jan 7th, 12:00 AM

Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks

Online

We consider a two-player network inspection game, in which a defender positions heterogeneous sensors according to a probability distribution in order to detect multiple attacks caused by a strategic attacker. We assume the defender has access to multiple types of sensors that can potentially differ in their accuracy. The objective of the defender (resp. attacker) is to minimize (resp. maximize) the expected number of undetected attacks. We derive a Nash equilibrium of this zero-sum game under the assumption that each component in the network can be monitored from a unique sensor location. We then leverage our constructed Nash equilibrium to provide approximate solutions to the general case by solving a minimum set cover problem. Our results illustrate the performance and computational advantage of our solution approach, as well as the value of strategically leveraging heterogeneous sensors to protect critical networks against attacks.

https://aisel.aisnet.org/hicss-55/os/cybersecurity/4