A Game Theoretic Model of Strategic Conflict in Cyberspace Operations Research Department Naval Postgraduate School, Monterey, CA 80 th MORS 12 June, 2012.

Slides:



Advertisements
Similar presentations
N. Basilico, N. Gatti, F. Amigoni DEI, Politecnico di Milano Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topology.
Advertisements

F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented.
Introduction to Game Theory
Todd W. Neller Gettysburg College
GAME THEORY.
Module 4 Game Theory To accompany Quantitative Analysis for Management, Tenth Edition, by Render, Stair, and Hanna Power Point slides created by Jeff Heyl.
Two-Player Zero-Sum Games
Chapter 14 Infinite Horizon 1.Markov Games 2.Markov Solutions 3.Infinite Horizon Repeated Games 4.Trigger Strategy Solutions 5.Investing in Strategic Capital.
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
An Introduction to... Evolutionary Game Theory
Eponine Lupo.  Questions from last time  3 player games  Games larger than 2x2—rock, paper, scissors  Review/explain Nash Equilibrium  Nash Equilibrium.
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
© 2015 McGraw-Hill Education. All rights reserved. Chapter 15 Game Theory.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Slide 1 of 13 So... What’s Game Theory? Game theory refers to a branch of applied math that deals with the strategic interactions between various ‘agents’,
A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes, “You can’t outrun a bear,” scoffs the camper. His.
What is the Best Position? More Advanced Positioning February, R. Baker1.
Basics on Game Theory For Industrial Economics (According to Shy’s Plan)
Gabriel Tsang Supervisor: Jian Yang.  Initial Problem  Related Work  Approach  Outcome  Conclusion  Future Work 2.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Lectures in Microeconomics-Charles W. Upton Minimax Strategies.
UNIT II: The Basic Theory Zero-sum Games Nonzero-sum Games Nash Equilibrium: Properties and Problems Bargaining Games Bargaining and Negotiation Review.
Extensive Game with Imperfect Information Part I: Strategy and Nash equilibrium.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Game Theory.
UNIT II: The Basic Theory Zero-sum Games Nonzero-sum Games Nash Equilibrium: Properties and Problems Bargaining Games Bargaining and Negotiation Review.
Minimax Strategies. Everyone who has studied a game like poker knows the importance of mixing strategies. –With a bad hand, you often fold –But you must.
Game Theory.
Copyright © Cengage Learning. All rights reserved. CHAPTER 11 ANALYSIS OF ALGORITHM EFFICIENCY ANALYSIS OF ALGORITHM EFFICIENCY.
Chapter 9 Games with Imperfect Information Bayesian Games.
1 1 BA 210 Lesson III.5 Strategic Uncertainty when Interests ConflictOverviewOverview.
Chapter 12 & Module E Decision Theory & Game Theory.
Games of Strategy (Game Theory) Topic 1 – Part IV.
Classifying Attributes with Game- theoretic Rough Sets Nouman Azam and JingTao Yao Department of Computer Science University of Regina CANADA S4S 0A2
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 4.1.Dynamic Games of Incomplete Information Lecture
1 ECE-517 Reinforcement Learning in Artificial Intelligence Lecture 7: Finite Horizon MDPs, Dynamic Programming Dr. Itamar Arel College of Engineering.
Motif finding with Gibbs sampling CS 466 Saurabh Sinha.
Dynamic Games & The Extensive Form
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Extensive Games with Imperfect Information
Lecture 5A Mixed Strategies and Multiplicity Not every game has a pure strategy Nash equilibrium, and some games have more than one. This lecture shows.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
1 1 Slide © 2006 Thomson South-Western. All Rights Reserved. Slides prepared by JOHN LOUCKS St. Edward’s University.
1 Parrondo's Paradox. 2 Two losing games can be combined to make a winning game. Game A: repeatedly flip a biased coin (coin a) that comes up head with.
Part 3 Linear Programming
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
Strategic Behavior in Business and Econ Static Games of complete information: Dominant Strategies and Nash Equilibrium in pure and mixed strategies.
Problems Markov Chains 2
1. 2 You should know by now… u The security level of a strategy for a player is the minimum payoff regardless of what strategy his opponent uses. u A.
Auctions serve the dual purpose of eliciting preferences and allocating resources between competing uses. A less fundamental but more practical reason.
Example 31: Solve the following game by equal gains method: Y I II I II I X II II
ECO290E: Game Theory Lecture 3 Why and How is Nash Equilibrium Reached?
 Problem solving involves a number of well- defined steps, which are as follows:  Define the problem.  Analyze the problem.  Identify and evaluate.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
Game Theory [geym theer-ee] : a mathematical theory that deals with the general features of competitive situations in a formal abstract way.
Q 2.1 Nash Equilibrium Ben
How Much and On What? Defending and Deterring Strategic Attackers
Chapter 15: Game Theory: The Mathematics Lesson Plan of Competition
Tiffany Bao∗, Yan Shoshitaishvili†, Fish Wang†
Game Theory “How to Win the Game!”.
SCIT1003 Chapter 2: Sequential games - perfect information extensive form Prof. Tsang.
Chapter 6 Game Theory (Module 4) 1.
Game Theory.
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Solutions Markov Chains 1
Solutions Markov Chains 1
Instructor: Vincent Conitzer
Chapter 15: Game Theory: The Mathematics Lesson Plan of Competition
Autonomous Network Alerting Systems and Programmable Networks
Presentation transcript:

A Game Theoretic Model of Strategic Conflict in Cyberspace Operations Research Department Naval Postgraduate School, Monterey, CA 80 th MORS 12 June, 2012 Harrison C. Schramm David L. Alderson W. Matthew Carlyle Nedialko B. Dimitrov

Cyber Conflict - definitions Defining characteristic: how weapons in cyberspace (cyber weapons) are discovered, developed, and employed Our model is a high-level, strategic look at the problem of Cyber conflict Key question: How long should a belligerent in cyber conflict hold an exploit in development before attacking? 2

Cyber Conflict – Approach Cyber conflict may be viewed as a game Players discover and develop attacks, which they then exercise at a time of their choosing Analysis is abstracted away from specific technologies, systems, and exploits. – Similar to other models of combat. 3

Related Work JASON (2010) The Science of Cybersecurity – DOD report, recommends game theory as an analytic method Shiva et al (2010) Game theoretic approaches to protect cyberspace – Presents a taxonomy of game theoretic methods in cyberspace Lye & Wing (2002) Game strategies in network security Shen et al (2007) A Markov game theoretic approach for cyber situational awareness 4

Cyber munition life-cycle Discovery Development ObsolescenceEmployment Adversary Patch 5

Cyber Game Mechanics Discovery of Exploit – Game state indexed as, where T is the age of the game, represents the length of time player i has known the exploit Development of Munition – After a player has discovered the exploit, they may develop the exploit in accordance with some known function, 6

Game Mechanics II Employment – Once a player has the exploit, he may choose to use it. His action set is defined as: Obsolesce – If either player discovers and patches the exploit before an attack is executed, all munitions are worthless and the game ends. 7

State Transitions This state is recurrent until the first discovery is made

Our Analysis Zero Sum Two Players Identical Systems One zero-day Exploit Perfect Information 9

Solving the game relies on building on cases based on knowledge 10 No Players One player Both Players Solution Hierarchy; solving the case where neither player has the exploit depends on the one-player case, which in turn depends on the case where both players have the exploit.

The Base: Both Players know the Exploit If both players know the exploit, “Attack, Attack” is the optimum solution by iterated elimination of dominated strategies 11 We may compute the value of the game for cases where

State Transitions This state is recurrent until the first discovery is made Not Reachable for optimal players with perfect knowledge Absorbing

Situation II – One player knows the exploit Under what circumstances should Player 1 wait (and possibly gain attack value? For monotone functions, this is straightforward, but the general case is solved as well. 13 We may compute the value of the game for cases where

State Transitions Not Reachable Starting Here Will Player 2 Reach a better state on the axis? Before Player 1 Discovers the Exploit?

The general case – neither player knows the exploit… 15 we can compute the value of the game from any state, including

State Transitions Not Reachable for optimal players with perfect knowledge Absorbing Starting Here Who wins?

Numerical Analysis 17

Basic Case If the players have constant probability of detection, and constant attack value functions, then Player 1 will expect to win if:

Example II Suppose Players 1 and 2 have attack functions such that:. Here, we have to compute the optimum number of turns to wait before attacking, which turns out to be 5, matching our intuition

Example II – the effect of varying 20

Example II Suppose Players 1 and 2 have attack functions such that: Note that since Player 1 has the exploit, Is irrelevant

Example II Value function associated with example two. We see that the maximum value of occurs at Therefore, in this case, it is not ‘worth it’ to wait.

Extensions 23

Waiting Times What happens if we introduce non-productive waiting times? – Such as administrative approval chains – Or other reasons Conclusion: If you are slow to act, you can make it up (a little bit) by increasing capability in other areas, but only to a point.

State Transitions Discovers Here Cannot progress until w time periods pass

Waiting Times Payoff to Player 1 of an otherwise ‘even’ cyber game, where player 1 is forced to wait w time periods after discovery before any action may be taken.

Waiting Times II Player 1’s Required probability of detection, to ‘break even’ as a function of wait time. Note in this scenario that after 9 time periods, perfect detection is required; further advancements are not possible

Conclusion We present a lexicon and framework for analyzing cyber conflict Future work: – Multiple Attacks – Imperfect Information – Incorporating issues outside of cyber (i.e. kinetic) 28

NPS OR Cyber interest points of contact: CDR Harrison Schramm – – Professor Matt Carlyle – Professor Dave Alderson – – Professor Ned Dimitrov – –

Backup 30

State Transitions