=Paper=
{{Paper
|id=Vol-2081/paper08
|storemode=property
|title=A Search for Saddle Point in Protectable Assets Selection Problem Based on Continuous Game Theory Model
|pdfUrl=https://ceur-ws.org/Vol-2081/paper08.pdf
|volume=Vol-2081
|authors=Alexander Yu. Bykov,Ivan. A. Krygin
}}
==A Search for Saddle Point in Protectable Assets Selection Problem Based on Continuous Game Theory Model ==
A Search for Saddle Point in Protectable Assets
Selection Problem Based on Continuous Game
Theory Model
Alexander Yu. Bykov Ivan. A. Krygin
Information Security Department Information Security Department
Bauman Moscow State Technical University Bauman Moscow State Technical University
Moscow, Russia Moscow, Russia
abykov@bmstu.ru krygin.ia@gmail.com
Abstract. This article considers a continuous zero-sum game formulate the interactions between a receiver and a spoofing
of two players with resources limitations between defender, node in the spoofing detection as a zero-sum game.
selecting the assets to be protected, and attacker, selecting the
assets to be attacked. Players’ solutions are defense and attack In [4] it’s investigated appliance of learning, based on game
probabilities vectors for each asset. The problem is formulated theory, to analyze big data. Such technique may be useful to
that each player must solve linear programming problem with analyze social networks. There are considered a linear game
fixed opponent’s solution. The saddle point is suggested to search model of multiple players (agents), data storing in huge
on simplices faces, defined by limitations. To find it two systems storages, each agent is related to sensitive information. Model
of linear equations is necessary to be solved: one to find is continuous, solution search satisfying Nash criterion is
defender’s solution and another to find attacker’s solution. Each considered.
player chooses solution on his face so that another player’s
parameter value is the same for any solution on his own face. To In [5] resource distribution in multiple access wiretap
find a saddle with a guarantee it necessary to go over all channels is considered. In model it’s considered several users
combinations of simplices faces. An example of the solution of the who want to confidentially transmit data to legitimate user. On
problem is presented. The total game cost, probabilities of receiver side there is an adversary, who passively listen to
attacks on assets and probabilities of defense are calculated. channel and try to decode messages. Stochastic game is
considered, solutions are sought to be Nash and Pareto optimal.
Keywords. information security, zero-sum game, linear
programming, saddle point, simplex, face of simplex, system of In [6] an efficient stochastic zero-sum game with
linear equations incomplete information is considered. In article it’s
investigated problem of own secret information disclosure to
obtain adversary secret information and its solution strategies
I. INTRODUCTION are suggested.
Game theory models are often used in problems related
with information security. Consider some examples. In [7] it’s considered game technique to detect hardware
trojans. Authors notice, the microcircuit industry is witnessing
In [1] a game theory appliance in steganography is a massive outsourcing of the fabrication of ICs, and it brings up
considered. Authors notice, there are a few articles related to multiple opportunities for the insertion of malicious logic in the
this topic, because of adaptive attacks in steganography haven’t ICs. Authors suggest using game theory to detect such
been carried out until recently. Two players are considered: insertions.
deplorer player and detection players are described. A saddle
point searching algorithm in mixed strategies is suggested. In [8] it’s considered a modelling of jamming attack in
networks with wireless energy transfer. Authors have
In [2] it is considered an optimal strategy of network developed a game model, that allows to avoid energy
protection with usage of Moving Target Defense principle, interception. There are two players in the game: legitimate user
based on Markov game. An essence of MTD – moving and adversary. Each player has his own utility function,
network elements vary in time, making attack more difficult. solution is sought as limited Nash equilibrity.
Markov decision process is used to describe transitions
between network multistates. Dynamic game is used to Information security software is often used to protect
describe multiphase steps of defense and attack in terms of information in information processing and control systems
MTD. (IPCS). This software is generally deployed on computational
tools, which is used to solve target and supporting tasks in
In [3] it’s investigated the PHY-layer authentication that IPCS. In this case security software uses computational
exploits radio channel information to detect spoofing attacks in resources, and these resources are often limited, and their
multiple- input multiple-output (MIMO) systems. Authors deficit is possible. This task becomes especially actual in
36
mobile security protection, which have limited computational 2) 𝑝𝑝𝑟 𝑖 ∈ [0, 1], ∀ 𝑖 ∈ 𝑀 – i-th asset attack prevention
resources. probability when defending
The following definitions will be used: 3) 𝑎𝑘𝑖 ∈ [ 0, 1 ), ∀ 𝑘 ∈ 𝐿, 𝑖 ∈ 𝑀 – normalized k-th
defender’s limited resource value, used to protect i-th asset.
protected asset – something is needed to be protected The whole asset equals to 1
resource – computational resource, used by security 4) 𝑏𝑘 ∈ [ 0, 1 ), ∀ 𝑘 ∈ 𝐿 – maximum normalized k-th
software limited resource value, allocated for protection
5) с𝑘𝑖 ∈ [ 0, 1 ), ∀ 𝑘 ∈ 𝑆, 𝑖 ∈ 𝑀 – normailzed k-th
Protected resources are:
attacker’s limited resource value, used to attack i-th asset. The
integrity, availability, confidentiality of data, storing on whole asset equals to 1
devices 6) 𝑑𝑘 ∈ [ 0, 1 ), ∀ 𝑘 ∈ 𝑆 – maximum normalized k-th
integrity, availability, confidentiality of data, attacker’s limited resource value
transferring over communication lines C. Parameters
etc. Define variable 𝑝𝑖 ∈ [0, 1], ∀ 𝑖 ∈ 𝑀, signifying probability
asset protection probability or its security degree. Variables
System resources are:
forms vector 𝑃⃗ . For attacker define variable 𝑞𝑖 ∈ [0, 1], ∀ 𝑖 ∈
security software cost 𝑀, signifying asset attack probability or attack reliability
degree. Variables form vector 𝑄 ⃗.
CPU time
RAM size D. Players indicators
Storage size For zero-sum game players quality indicators are defined
by defender damage. Average cost damage is:
Network
⃗ ) = 𝑈𝑚𝑎𝑥 (𝑄
𝑈(𝑃⃗ , 𝑄 ⃗ ) − 𝑈пр (𝑃⃗ , 𝑄
⃗)
etc. (1)
= ∑ 𝑤𝑖 𝑞𝑖 − ∑ 𝑝𝑝𝑟 𝑖 𝑤𝑖 𝑝𝑖 𝑞𝑖
Consider the problem of computer resources distribution 𝑖 ∈𝑀 𝑖 ∈𝑀
between assets and use two-players zero-sum game (defender
and attacker parties). Solution belonging to saddle-point, if it where 𝑈𝑚𝑎𝑥 (𝑄 ⃗ ) = ∑𝑖 ∈𝑀 𝑤𝑖 𝑞𝑖 maximum damage, may be
exists, is often a decision criterion in game-theory. Consider a caused by attacker without protection; 𝑈пр (𝑃⃗ , 𝑄 ⃗)=
possible approach to find a solution. Elements of selection set ∑𝑖 ∈𝑀 𝑝𝑝𝑟 𝑖 𝑤𝑖 𝑝𝑖 𝑞𝑖 – damage, prevented by defender
are continuous. It’s necessary to find asset protection
possibilities and attacks on assets possibilities. Some samples
of game-theory usage for solving information security E. Limitations
problems are presented in [1-4]
Defender’s limited resources usage limitation:
Proposed protected assets selection problem formulation is
similar to formulation, discussed in [5], but in [5] was used the ∑ 𝑎𝑖𝑘 𝑝𝑖 ≤ 𝑏𝑘 , ∀ 𝑘 ∈ 𝐿.
one cost limitation. In case of saddle point is impossible to find (2)
𝑖 ∈𝑀
by optimized algorithm guaranteed result principle was
applied. Attacker’s limited resources usage limitation:
∑ 𝑐𝑖𝑘 𝑞𝑖 ≤ 𝑑𝑘 , ∀ 𝑘 ∈ 𝑆 (3)
II. FORMULATION OF SECURITY SYSTEM RESOURCES
𝑖 ∈𝑀
DISTRIBUTON BETWEEN PROTECTED ASSETS PROBLEM
Thus, each player’s decision (searching for unknown
A. Initial data ⃗ ) with fixed opponent’s solution implies linear
vectors 𝑃⃗ or 𝑄
1) 𝑍 = {𝑧1 , 𝑧2 , … , 𝑧𝑚 } - protected assets set, 𝑀 = programming problem solution
{1, 2, … , 𝑚} - their indices set
2) 𝑅 = {𝑟1 , 𝑟2 , … , 𝑟𝑙 } – defender’s limited resources set, III. BASES OF ALGORITHM OF SEARCHING FOR SADDLE
𝐿 = {1, 2, … , 𝑙} – their indicies set POINT ON THE DEFINED BY LIMITATIONS SIMPLEX FACES
3) 𝑁 = {𝑛1 , 𝑛2 , … , 𝑛𝑠 } – attacker’s limited resources set, Optimization problem for first player with fixed second
𝑆 = {1, 2, … , 𝑠} – their indices set player’s decision is a linear programming problem. The first
player wishes to minimize parameter (1) with limitations (2),
B. Set elements parameters and relations between them
and the second one wishes to maximize parameter (1) with
1) 𝑤𝑖 ≥ 0, ∀ 𝑖 ∈ 𝑀 – cost, if i-th protected asset security limitations (3).
breach occurred (asset cost)
In [15] levels technique is suggested to find saddle point of
convex-concave function. This method is approximate and is
37
required to solve convex programming problems. Also, it is ⃗ (1) ) = 𝑈(𝑃⃗ ∗ , 𝑄
𝑈(𝑃⃗ ∗ , 𝑄 ⃗ (2) ),
pointed the saddle point always exists under given conditions.
⃗ (1) ) = 𝑈(𝑃⃗ ∗ , 𝑄
𝑈(𝑃⃗ ∗ , 𝑄 ⃗ (3) ),
⃗ ∗ may
The saddle point defined by solutions pair 𝑃⃗ ∗ and 𝑄 …..
be as on vertices of two simplices, defined by limitations (2) ⃗ (1) ) = 𝑈(𝑃⃗ ∗ , 𝑄
𝑈(𝑃⃗ ∗ , 𝑄 ⃗ (𝑚) ),
and (3), and on simplices faces. Optimized technique may be
used to find saddle point if it is on vertices. ∑ 𝛼 (𝑖) = 1.
{ 𝑖 ∈𝑀
Simplices (polyhedron of allowable values) are in m-
dimension metric space. In this case each limitation of System of equations 2 relatively unknown
inequalities (2) and (3) defines (m-1)-dimensioned hyperplane 𝛽 (1) , 𝛽 (2) , … , 𝛽 (𝑚) :
if becomes equality. As 𝑝𝑖 ∈ [0, 1], ∀ 𝑖 ∈ 𝑀 and 𝑞𝑖 ∈
[0, 1], ∀ 𝑖 ∈ 𝑀, allowable solutions are also inside of ⃗ ∗ ) = 𝑈(𝑃⃗ (2) , 𝑄
𝑈(𝑃⃗ (1) , 𝑄 ⃗ ∗ ),
hypercube with sides are equal to 1. Hypercubes are ⃗ ∗ ) = 𝑈(𝑃⃗ (3) , 𝑄
𝑈(𝑃⃗ (1) , 𝑄 ⃗ ∗ ),
constrained by (m-1)-dimensioned hyperplanes, defined by …..
𝑝𝑖 = 0, ∀ 𝑖 ∈ 𝑀, 𝑝𝑖 = 1, ∀ 𝑖 ∈ 𝑀 evaluations for defender ⃗ ∗ ) = 𝑈(𝑃⃗ (𝑚) , 𝑄
⃗ ∗ ),
and 𝑞𝑖 = 0, ∀ 𝑖 ∈ 𝑀, 𝑞𝑖 = 1, ∀ 𝑖 ∈ 𝑀 evaluations for attacker. 𝑈(𝑃⃗ (1) , 𝑄
In this way simplices are constrained by hyperplanes defined ∑ 𝛽 (𝑖) = 1.
by limitations (2) and (3) (if inequalities become equalities) { 𝑖 ∈𝑀
and hypercubes borders hyperplanes. An intersection of two
(m-1)-dimensioned hyperplanes (if they intersect) is a (m-2)- ⃗ ∗ satisfy limitations (2) and (3)
If found solutions 𝑃⃗ ∗ and 𝑄
dimensioned hyperplane; an intersection of three hyperplanes and saddle point condition, then this is a required solution.
is (m-3)-dimensioned hyperplane etc. Separated point of m-
dimensioned space in this interpretation is 0-dimensioned IV. EXAMPLE
hyperplane. Simplices faces may belong to different
Consider the solution of low dimension problem of
dimensioned hyperplanes (in three dimensioned case the
protecting some assets: number of protectable assets – 8,
following terms are used: faces, edges, vertices). It is necessary
number of defender’s limited resources with defense cost -4,
to go over all faces for full search. Consider the technique of
number of attacker’s limited resources and attack costs – 4.
searching for possible solutions on faces, belong to same-
Other data are generated by pseudorandom number generator.
dimensioned hyperfaces.
Protected assets parameters, such as possible loss,
For each face it reachability is checked, that is allowable
probability (possibility) of assets attacks prevention are given
solution must exist for each player on his own face. It’s not
in table 1. Possible damage values are given in conventional
necessary to examine unreachable faces.
units. Defender’s limited resources parameters, such as defense
Saddle point on simplices faces, defined by limitations, costs as resource and right sides of (2) values are given in table
must satisfy the following conditions if it exists. Point 𝑃⃗ ∗ on 2. Attacker’s limited resources parameters, such as attack costs
face must ensure that target function reaches maximum and as resource and right sides of (2) values are given in table 2.
takes the same values on each point on second player’s face in Costs are given in conventional units.
vector space 𝑄 ⃗ . Similarly point 𝑄⃗ ∗ on face must ensure that
target function reaches minimum and takes the same values on TABLE I. PROTECTABLE ASSETS PARAMETERS
each point on first player’s face in vector space 𝑃⃗ . Size of possible Attack prevention
# damage probability
It is necessary to find m different points per each (m-1)- 𝑝𝑝𝑟 𝑖 , ∀ 𝑖 ∈ 𝑀
𝑤𝑖 , ∀ 𝑖 ∈ 𝑀
dimensioned face (not necessarily satisfying all the limitations 1 4535,63 0,967
(2) or (3)). Let 𝑃⃗(1) , 𝑃⃗ (2) , … , 𝑃⃗ (𝑚) are points on face in vector 2 2075,96 0,607
space 𝑃⃗ , and 𝑄⃗ (1) , 𝑄
⃗ (2) , … , 𝑄
⃗ (𝑚) are points on face in vector 3 3357,13 0,805
⃗ . Define multipliers 𝛼 (1) , 𝛼 (2) , … , 𝛼 (𝑚) and 4 2972,23 0,769
space 𝑄 5 3409,13 0,676
𝛽 , 𝛽 , … , 𝛽 (𝑚) . So required points is found is the following
(1) (2)
6 2260,05 0,973
form: 𝑃⃗ ∗ = ∑𝑖 ∈𝑀 𝛼 (𝑖) 𝑃⃗ (𝑖) , 𝑄 ⃗ ∗ = ∑𝑖 ∈𝑀 𝛽 (𝑖) 𝑄⃗ (𝑖) . 7 2188,76 0,660
8 4280,74 0,708
System of equations 1 relatively unknown
𝛼 (1) , 𝛼 (2) , … , 𝛼 (𝑚) :
38
Suggested solutions reliability is based on usage of known
TABLE II. DEFENDER’S RESOURCES verifies algorithms, found saddle point is confirmed by check
Defender’s resources values for compliance with conditions it must satisfy.
𝑎𝑘𝑖 , ∀ 𝑘 ∈ 𝐿, 𝑖 ∈ 𝑀
#
Defense
cost
Resource 1 Resource 2 Resource 3 REFERENCES
1 392,038 0,340 0,345 0,153 [1] Schöttle P., Böhme R. Game Theory and Adaptive Steganography. IEEE
2 144,472 0,176 0,319 0,392 Transactions on Information Forensics and Security. 2016. Vol. 11, iss.
3 292,657 0,273 0,160 0,426 4. P. 760–773. DOI: 10.1109/TIFS.2015.2509941.
4 147,133 0,130 0,151 0,381 [2] Lei C., Ma D., Zhang H. Optimal Strategy Selection for Moving Target
5 128,114 0,218 0,229 0,410 Defense Based on Markov Game. IEEE Access. 2017. Vol. 5. P. 156–
6 252,678 0,451 0,263 0,250 169. DOI: 10.1109/ACCESS.2016.2633983.
7 194,546 0,437 0,300 0,318 [3] Xiao Liang., Chen T., Han G., Zhuang W., Sun L. Channel-Based
8 329,060 0,101 0,345 0,246 Authentication Game in MIMO Systems. 2016 IEEE Global
Total Communications Conference (GLOBECOM). 2016. P. 1–6. DOI:
940,349 1,200 1,179 1,634 10.1109/GLOCOM.2016.7841657.
𝑏𝑘 , ∀𝑘 ∈ 𝐿
[4] Chessa M., Grossklags J., Loiseau P. A Game-Theoretic Study on Non-
TABLE III. ATTACKER’S RESOURCES monetary Incentives in Data Analytics Projects with Privacy
Implications. 2015 IEEE 28th Computer Security Foundations
Attacker’s resources values Symposium. 2015. P. 90–104. DOI: 10.1109/CSF.2015.14.
# с𝑘𝑖 , ∀ 𝑘 ∈ 𝑆, 𝑖 ∈ 𝑀
[5] Shah S. Chaitanya A., Sharma V. Resource allocation in fading multiple
Attack cost Resource 1 Resource 2 Resource 3
access wiretap channel via game theoretic learning. 2016 Information
1 22,361 0,350 0,233 0,242 Theory and Applications Workshop (ITA). 2016. P. 1–7. DOI:
2 14,527 0,148 0,248 0,247 10.1109/ITA.2016.7888137.
3 13,823 0,164 0,158 0,176
[6] Li L., Shamma J. Efficient computation of discounted asymmetric
4 20,547 0,199 0,112 0,306 information zero-sum stochastic games. 2015 54th IEEE Conference on
5 18,650 0,322 0,349 0,322 Decision and Control (CDC). 2015. P. 4531–4536. DOI:
6 34,593 0,431 0,479 0,403 10.1109/CDC.2015.7402927.
7 44,407 0,185 0,364 0,347
[7] Kamhoua C., Zhao H., Rodriguez M., Kwiat K. A Game-Theoretic
8 25,191 0,331 0,486 0,421 Approach for Testing for Hardware Trojans. IEEE Transactions on
Total Multi-Scale Computing Systems. 2016. Vol. 2, iss. 3. P. 199–210. DOI:
116,459 1,070 1,542 1,694
𝑑𝑘 , ∀𝑘 ∈ 𝑆 10.1109/TMSCS.2016.2564963.
[8] Niyato D., Wang P., Kim D., Han Z., Xiao L. Game theoretic modeling
of jamming attack in wireless powered communication networks. 2015
Because of going over faces the saddle point was found on IEEE International Conference on Communications (ICC). 2015. P.
faces belonging to 6-dimension hyperplanes (solution is sought 6018–6023. DOI: 10.1109/ICC.2015.7249281.
in initial 8-dimension spaces). For defender hyperplane is [9] Freudiger J., Manshaei M.H., Hubaux J. P., Parkes D.C. Non-
defined by two 7-dimension hyperplanes intersection – one Cooperative Location Privacy. IEEE Transactions on Dependable and
hyperplane containing face, defined by defense cost limitation, Secure Computing. 2013. Vol. 10, iss. 2. P. 84 – 98. DOI:
and another hyperplane defined by condition 𝑝6 = 0. For 10.1109/TDSC.2012.85.
attacker hyperplane is defined by two 7-dimension hyperplanes [10] Lelarge M. Coordination in Network Security Games: A Monotone
Comparative Statics Approach. IEEE Journal on Selected Areas in
intersection – one hyperplane containing face, defined by Communications. 2012. Vol. 30, iss. 11. P. 2210 – 2219. DOI:
resource 2 limitation, and another hyperplane defined by 10.1109/JSAC.2012.121213.
condition 𝑞6 = 0. Solution is presented in table 4. [11] Liang Xiao, Yan Chen, Lin W.S., Liu K.J.R. Indirect Reciprocity
Security Game for Large-Scale Wireless Networks. IEEE Transactions
on Information Forensics and Security. 2012. Vol. 7, iss. 4. P. 1368 –
TABLE IV. SOLUTION 1380. DOI: 10.1109/TIFS.2012.2202228.
Game [12] Ma C.Y.T., Yau D.K.Y., Rao N.S.V. Scalable Solutions of Markov
Vector 𝑃⃗ ∗ cost Games for Smart-Grid Infrastructure Protection. IEEE Transactions on
0,422 0,751 0,778 0,634 0,409 0,000 0,532 0,576 Smart Grid. 2013. Vol. 4, iss. 1. P. 47 – 55. DOI:
⃗∗ 8200, 10.1109/TSG.2012.2223243.
Vector 𝑄 144
0,607 0,779 0,736 0,437 0,378 0,000 0,915 0,737 [13] Xiannuan Liang, Yang Xiao. Game Theory for Network Security. IEEE
Communications Surveys & Tutorials. 2013. Vol. 15, iss. 1. P. 472 –
486. DOI: 10.1109/SURV.2012.062612.00056.
CONCLUSION
[14] A. Yu. Bykov, E. S. Shmatova The Algorithms of Resource Distribution
There is presented a continuous two players zero-sum game for Information Security Between Objects of an Information System
with resources limitation for choosing assets to protect by Based on the Game Model and Principle of Equal Security of Objects.
defender and choosing assets to attack by attacker. Each player Science and Education of the Bauman MSTU, 2015, No. 9, pp. 160–187.
DOI: 10.7463/0915.0812283.
solves linear programming problem with fixed opponent
decision. If saddle point is on simplices faces, defined by [15] Shmatova E. The Choice of Strategy for the Spurious Information
System on the Basis of the Game Theory Model. Voprosy
limitations, then it is suggested to solve two systems of linear kiberbezopasnosti [Cybersecurity issues], 2015. No 5 (13). P. 36-40.
equations to find it. DOI: 10.21681/2311-3456-2015-5-36-40.
[16] E. G. Golshtein, A. S. Nemirovsky, Yu. E. Nesterov Optimization
techniques. Levels technique, it generalizations and applications.
Economics and mathematical methods. 1995. V. 31. no. 3. pp. 164-180.
39