• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种通过协议组合进行信息流控制的博弈论方法。

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.

作者信息

Alvim Mário S, Chatzikokolakis Konstantinos, Kawamoto Yusuke, Palamidessi Catuscia

机构信息

Computer Science Department, Universidade Federal de Minas Gerais (UFMG), Belo Horizonte-MG 31270-110, Brazil.

École Polytechnique, 91128 Palaiseau, France.

出版信息

Entropy (Basel). 2018 May 18;20(5):382. doi: 10.3390/e20050382.

DOI:10.3390/e20050382
PMID:33265472
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7512901/
Abstract

In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choice among different protocols, and its effect on the amount of leakage depends heavily on whether or not this choice is visible to the attacker. In this work, we consider operators for modeling visible and hidden choice in protocol composition, and we study their algebraic properties. We then formalize the interplay between defender and attacker in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage. We consider various kinds of leakage games, depending on whether players act simultaneously or sequentially, and on whether or not the choices of the defender are visible to the attacker. In the case of sequential games, the choice of the second player is generally a function of the choice of the first player, and his/her probabilistic choice can be either over the possible functions (mixed strategy) or it can be on the result of the function (behavioral strategy). We show that when the attacker moves first in a sequential game with a hidden choice, then behavioral strategies are more advantageous for the defender than mixed strategies. This contrasts with the standard game theory, where the two types of strategies are equivalent. Finally, we establish a hierarchy of these games in terms of their information leakage and provide methods for finding optimal strategies (at the points of equilibrium) for both attacker and defender in the various cases.

摘要

在定量信息流(QIF)中研究的推理攻击中,攻击者通常试图干扰系统,以增加其秘密信息的泄露。另一方面,防御者通常试图通过引入一些可控噪声来减少泄露。这种噪声引入可以建模为一种协议组合类型,即在不同协议之间进行概率选择,其对泄露量的影响在很大程度上取决于这种选择对攻击者是否可见。在这项工作中,我们考虑用于对协议组合中的可见选择和隐藏选择进行建模的算子,并研究它们的代数性质。然后,我们在一个适用于QIF特定问题的博弈论框架中形式化防御者和攻击者之间的相互作用,其中收益是信息泄露。我们考虑各种类型的泄露博弈,这取决于玩家是同时行动还是相继行动,以及防御者的选择对攻击者是否可见。在相继博弈的情况下,第二个玩家的选择通常是第一个玩家选择的函数,并且他/她的概率选择可以是在可能的函数上(混合策略),也可以是在函数的结果上(行为策略)。我们表明,当攻击者在具有隐藏选择的相继博弈中首先行动时,那么行为策略对防御者比混合策略更有利。这与标准博弈论形成对比,在标准博弈论中这两种策略类型是等价的。最后,我们根据信息泄露建立这些博弈的层次结构,并提供在各种情况下为攻击者和防御者找到最优策略(在均衡点)的方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/727a2e232f5b/entropy-20-00382-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/197ed8ad07f0/entropy-20-00382-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/2957b4372291/entropy-20-00382-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/727a2e232f5b/entropy-20-00382-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/197ed8ad07f0/entropy-20-00382-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/2957b4372291/entropy-20-00382-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/33f4/7512901/727a2e232f5b/entropy-20-00382-g003.jpg

相似文献

1
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.一种通过协议组合进行信息流控制的博弈论方法。
Entropy (Basel). 2018 May 18;20(5):382. doi: 10.3390/e20050382.
2
Attacker-defender game from a network science perspective.从网络科学视角看攻防博弈
Chaos. 2018 May;28(5):051102. doi: 10.1063/1.5029343.
3
An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.具有替代和互补效应的攻击者-防御者资源分配博弈
Risk Anal. 2020 Jul;40(7):1481-1506. doi: 10.1111/risa.13483. Epub 2020 May 19.
4
Defender-Attacker Games with Asymmetric Player Utilities.具有非对称玩家效用的防御-攻击博弈。
Risk Anal. 2020 Feb;40(2):408-420. doi: 10.1111/risa.13399. Epub 2019 Sep 17.
5
A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks.电力系统恶意攻击脆弱性评估的通用框架。
Risk Anal. 2017 Nov;37(11):2182-2190. doi: 10.1111/risa.12781. Epub 2017 Feb 23.
6
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.连续努力的序贯攻防博弈中的威慑与风险偏好
Risk Anal. 2017 Nov;37(11):2229-2245. doi: 10.1111/risa.12768. Epub 2017 Mar 17.
7
Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma.考虑信息困境的多类型攻击者攻防博弈模型
Entropy (Basel). 2022 Dec 28;25(1):57. doi: 10.3390/e25010057.
8
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.基于“热身”脑脊液的攻防博弈中的建模资源分配
Risk Anal. 2016 Apr;36(4):776-91. doi: 10.1111/risa.12502. Epub 2015 Dec 29.
9
Detection Games under Fully Active Adversaries.完全主动对抗下的检测博弈
Entropy (Basel). 2018 Dec 29;21(1):23. doi: 10.3390/e21010023.
10
A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.智能电网安全中的多阶段博弈:一种强化学习解决方案
IEEE Trans Neural Netw Learn Syst. 2019 Sep;30(9):2684-2695. doi: 10.1109/TNNLS.2018.2885530. Epub 2019 Jan 7.

引用本文的文献

1
Information Theory in Game Theory.博弈论中的信息论
Entropy (Basel). 2018 Oct 24;20(11):817. doi: 10.3390/e20110817.