Approximate Solutions for Attack Graph Games with Imperfect Information

Karel Durkota, Viliam Lisy, Branislav Bosansky, and Christopher Kiekintveld

In IJCAI Workshop on Behavioral, Economic and Computational Intelligence for Security (BECIS). 2015.

This is the author's version of the work.

Download

Abstract

We focus on network hardening with honeypots which could trap and expose the attacker. We model this problem as a general-sum extensiveform game with imperfect information. Based on a specific computer network, the defender seeks for an optimal deployment of honeypots while the attacker uses an attack plan from a library of possible attacks compactly modeled by attack graphs. We detecting the attacker's rationalizable strategies and compute Stackelberg Equilibrium by solving mixed-integer linear programming formulations and improve it with iterative oracle approach. However, this approach has limited scalability. Therefore, we also analyze a trade-off between complexity and optimality of game approximations, which bring useful results for the games in security domain.