Location
Online
Event Website
https://hicss.hawaii.edu/
Start Date
3-1-2022 12:00 AM
End Date
7-1-2022 12:00 AM
Description
We consider a two-player network inspection game, in which a defender positions heterogeneous sensors according to a probability distribution in order to detect multiple attacks caused by a strategic attacker. We assume the defender has access to multiple types of sensors that can potentially differ in their accuracy. The objective of the defender (resp. attacker) is to minimize (resp. maximize) the expected number of undetected attacks. We derive a Nash equilibrium of this zero-sum game under the assumption that each component in the network can be monitored from a unique sensor location. We then leverage our constructed Nash equilibrium to provide approximate solutions to the general case by solving a minimum set cover problem. Our results illustrate the performance and computational advantage of our solution approach, as well as the value of strategically leveraging heterogeneous sensors to protect critical networks against attacks.
Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks
Online
We consider a two-player network inspection game, in which a defender positions heterogeneous sensors according to a probability distribution in order to detect multiple attacks caused by a strategic attacker. We assume the defender has access to multiple types of sensors that can potentially differ in their accuracy. The objective of the defender (resp. attacker) is to minimize (resp. maximize) the expected number of undetected attacks. We derive a Nash equilibrium of this zero-sum game under the assumption that each component in the network can be monitored from a unique sensor location. We then leverage our constructed Nash equilibrium to provide approximate solutions to the general case by solving a minimum set cover problem. Our results illustrate the performance and computational advantage of our solution approach, as well as the value of strategically leveraging heterogeneous sensors to protect critical networks against attacks.
https://aisel.aisnet.org/hicss-55/os/cybersecurity/4