[go: up one dir, main page]

IDEAS home Printed from https://ideas.repec.org/a/gam/jgames/v13y2022i6p81-d991565.html
   My bibliography  Save this article

A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty

Author

Listed:
  • Thanh Hong Nguyen

    (Department of Computer and Information Science, University of Oregon, Eugene, OR 97403, USA)

  • Amulya Yadav

    (College of Information Sciences and Technology, Pennsylvania State University, State College, PA 16801, USA)

Abstract
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense strategy. This paper investigates the attacker’s imitative behavior deception under uncertainty , in which the attacker mimics a (deceptive) Quantal Response behavior model by consistently playing according to a certain parameter value of that model, given that it is uncertain about the defender’s actual learning outcome. We have three main contributions. First, we introduce a new maximin-based algorithm to compute a robust attacker deception decision under uncertainty, given the defender is unaware of the attacker deception. Our polynomial algorithm is built via characterizing the decomposability of the attacker deception space as well optimal deception behavior of the attacker against the worst case of uncertainty. Second, we propose a new counter-deception algorithm to tackle the attacker’s deception. We theoretically show that there is a universal optimal defense solution, regardless of any private knowledge the defender has about the relation between their learning outcome and the attacker deception choice. Third, we conduct extensive experiments in various security game settings, demonstrating the effectiveness of our proposed counter-deception algorithms to handle the attacker manipulation.

Suggested Citation

  • Thanh Hong Nguyen & Amulya Yadav, 2022. "A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty," Games, MDPI, vol. 13(6), pages 1-24, December.
  • Handle: RePEc:gam:jgames:v:13:y:2022:i:6:p:81-:d:991565
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2073-4336/13/6/81/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2073-4336/13/6/81/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. McKelvey Richard D. & Palfrey Thomas R., 1995. "Quantal Response Equilibria for Normal Form Games," Games and Economic Behavior, Elsevier, vol. 10(1), pages 6-38, July.
    2. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    3. Bo An & Fernando Ordóñez & Milind Tambe & Eric Shieh & Rong Yang & Craig Baldwin & Joseph DiRenzo & Kathryn Moretti & Ben Maule & Garrett Meyer, 2013. "A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard," Interfaces, INFORMS, vol. 43(5), pages 400-420, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    2. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    3. Karwowski, Jan & Mańdziuk, Jacek, 2019. "A Monte Carlo Tree Search approach to finding efficient patrolling schemes on graphs," European Journal of Operational Research, Elsevier, vol. 277(1), pages 255-268.
    4. Bosch-Domènech, Antoni & Vriend, Nicolaas J., 2013. "On the role of non-equilibrium focal points as coordination devices," Journal of Economic Behavior & Organization, Elsevier, vol. 94(C), pages 52-67.
    5. Kraemer, Carlo & Noth, Markus & Weber, Martin, 2006. "Information aggregation with costly information and random ordering: Experimental evidence," Journal of Economic Behavior & Organization, Elsevier, vol. 59(3), pages 423-432, March.
    6. Goeree, Jacob K. & Holt, Charles A. & Palfrey, Thomas R., 2002. "Quantal Response Equilibrium and Overbidding in Private-Value Auctions," Journal of Economic Theory, Elsevier, vol. 104(1), pages 247-272, May.
    7. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
    8. Steven N. Durlauf & Yannis M. Ioannides, 2010. "Social Interactions," Annual Review of Economics, Annual Reviews, vol. 2(1), pages 451-478, September.
    9. Marco Cipriani & Antonio Guarino, 2009. "Herd Behavior in Financial Markets: An Experiment with Financial Market Professionals," Journal of the European Economic Association, MIT Press, vol. 7(1), pages 206-233, March.
    10. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    11. Dutta, Rohan & Levine, David Knudsen & Modica, Salvatore, 2018. "Collusion constrained equilibrium," Theoretical Economics, Econometric Society, vol. 13(1), January.
    12. Ghidoni, Riccardo & Suetens, Sigrid, 2019. "Empirical Evidence on Repeated Sequential Games," Other publications TiSEM ff3a441f-e196-4e45-ba59-c, Tilburg University, School of Economics and Management.
    13. Tien Mai & Arunesh Sinha, 2022. "Safe Delivery of Critical Services in Areas with Volatile Security Situation via a Stackelberg Game Approach," Papers 2204.11451, arXiv.org.
    14. Bhattacharya, Sourav & Duffy, John & Kim, Sun-Tak, 2014. "Compulsory versus voluntary voting: An experimental study," Games and Economic Behavior, Elsevier, vol. 84(C), pages 111-131.
    15. Hoffmann, Magnus & Kolmar, Martin, 2017. "Distributional preferences in probabilistic and share contests," Journal of Economic Behavior & Organization, Elsevier, vol. 142(C), pages 120-139.
    16. Nieken, Petra & Schmitz, Patrick W., 2012. "Repeated moral hazard and contracts with memory: A laboratory experiment," Games and Economic Behavior, Elsevier, vol. 75(2), pages 1000-1008.
    17. David J. Cooper & Hanming Fang, 2008. "Understanding Overbidding in Second Price Auctions: An Experimental Study," Economic Journal, Royal Economic Society, vol. 118(532), pages 1572-1595, October.
    18. Chris Fields & James F. Glazebrook, 2024. "Nash Equilibria and Undecidability in Generic Physical Interactions—A Free Energy Perspective," Games, MDPI, vol. 15(5), pages 1-22, August.
    19. Philippe Jehiel, 2022. "Analogy-Based Expectation Equilibrium and Related Concepts:Theory, Applications, and Beyond," Working Papers halshs-03735680, HAL.
    20. Benaïm, Michel & Hofbauer, Josef & Hopkins, Ed, 2009. "Learning in games with unstable equilibria," Journal of Economic Theory, Elsevier, vol. 144(4), pages 1694-1709, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jgames:v:13:y:2022:i:6:p:81-:d:991565. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.