A game-theoretic analysis of deception over social networks using fake avatars

Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

Original languageEnglish (US)
Title of host publicationDecision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings
PublisherSpringer Verlag
Pages382-394
Number of pages13
Volume9996 LNCS
ISBN (Print)9783319474120
DOIs
StatePublished - 2016
Event7th International Conference on Decision and Game Theory for Security, GameSec 2016 - New York, United States
Duration: Nov 2 2016Nov 4 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9996 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other7th International Conference on Decision and Game Theory for Security, GameSec 2016
CountryUnited States
CityNew York
Period11/2/1611/4/16

Fingerprint

Deception
Avatar
Social Networks
Game
Nash Equilibrium
Attack
Internal

Keywords

  • Deception
  • Fake avatar
  • Game theory
  • Network security
  • Signaling game
  • Social network

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Mohammadi, A., Manshaei, M. H., Moghaddam, M. M., & Zhu, Q. (2016). A game-theoretic analysis of deception over social networks using fake avatars. In Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings (Vol. 9996 LNCS, pp. 382-394). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9996 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-47413-7_22

A game-theoretic analysis of deception over social networks using fake avatars. / Mohammadi, Amin; Manshaei, Mohammad Hossein; Moghaddam, Monireh Mohebbi; Zhu, Quanyan.

Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Vol. 9996 LNCS Springer Verlag, 2016. p. 382-394 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9996 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mohammadi, A, Manshaei, MH, Moghaddam, MM & Zhu, Q 2016, A game-theoretic analysis of deception over social networks using fake avatars. in Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. vol. 9996 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9996 LNCS, Springer Verlag, pp. 382-394, 7th International Conference on Decision and Game Theory for Security, GameSec 2016, New York, United States, 11/2/16. https://doi.org/10.1007/978-3-319-47413-7_22
Mohammadi A, Manshaei MH, Moghaddam MM, Zhu Q. A game-theoretic analysis of deception over social networks using fake avatars. In Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Vol. 9996 LNCS. Springer Verlag. 2016. p. 382-394. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-47413-7_22
Mohammadi, Amin ; Manshaei, Mohammad Hossein ; Moghaddam, Monireh Mohebbi ; Zhu, Quanyan. / A game-theoretic analysis of deception over social networks using fake avatars. Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Vol. 9996 LNCS Springer Verlag, 2016. pp. 382-394 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{c240763ef4a54d58891071e28d9dc73b,
title = "A game-theoretic analysis of deception over social networks using fake avatars",
abstract = "In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.",
keywords = "Deception, Fake avatar, Game theory, Network security, Signaling game, Social network",
author = "Amin Mohammadi and Manshaei, {Mohammad Hossein} and Moghaddam, {Monireh Mohebbi} and Quanyan Zhu",
year = "2016",
doi = "10.1007/978-3-319-47413-7_22",
language = "English (US)",
isbn = "9783319474120",
volume = "9996 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "382--394",
booktitle = "Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings",
address = "Germany",

}

TY - GEN

T1 - A game-theoretic analysis of deception over social networks using fake avatars

AU - Mohammadi, Amin

AU - Manshaei, Mohammad Hossein

AU - Moghaddam, Monireh Mohebbi

AU - Zhu, Quanyan

PY - 2016

Y1 - 2016

N2 - In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

AB - In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

KW - Deception

KW - Fake avatar

KW - Game theory

KW - Network security

KW - Signaling game

KW - Social network

UR - http://www.scopus.com/inward/record.url?scp=84994802509&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84994802509&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-47413-7_22

DO - 10.1007/978-3-319-47413-7_22

M3 - Conference contribution

AN - SCOPUS:84994802509

SN - 9783319474120

VL - 9996 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 382

EP - 394

BT - Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings

PB - Springer Verlag

ER -