Abstract | ||
---|---|---|
In this paper, we apply game theory to model strategies of secrecy and deception in a multiple-period attacker–defender resource-allocation and signaling game with incomplete information. At each period, we allow one of the three possible types of defender signals—truthful disclosure, secrecy, and deception. We also allow two types of information updating—the attacker updates his knowledge about the defender type after observing the defender’s signals, and also after observing the result of a contest (if one occurs in any given time period). Our multiple-period model provides insights into the balance between capital and expense for defensive investments (and the effects of defender private information, such as defense effectiveness, target valuations, and costs), and also shows that defenders can achieve more cost-effective security through secrecy and deception (possibly lasting more than one period), in a multiple-period game. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1016/j.ejor.2009.07.028 | European Journal of Operational Research |
Keywords | Field | DocType |
Game theory,Signaling game,Secrecy and deception,Truthful disclosure,Dynamic programming,Multi-period game | Economics,Confidentiality,Signaling game,Deception,Computer security,CONTEST,Secrecy,Game theory,Private information retrieval,Complete information | Journal |
Volume | Issue | ISSN |
203 | 2 | 0377-2217 |
Citations | PageRank | References |
62 | 3.20 | 15 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jun Zhuang | 1 | 103 | 5.37 |
Vicki M. Bier | 2 | 421 | 40.44 |
Oguzhan Alagöz | 3 | 84 | 6.28 |