Skip to main content

Showing 1–31 of 31 results for author: Kamhoua, C

.
  1. arXiv:2402.06023  [pdf, other

    cs.LG cs.AI cs.GT

    Decision Theory-Guided Deep Reinforcement Learning for Fast Learning

    Authors: Zelin Wan, **-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh

    Abstract: This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performance and robustness in complex environments, enabling more efficient and reliable convergence during learning. Our investigation encompasses two primary… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  2. arXiv:2308.11817  [pdf, other

    cs.GT

    Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles Kamhoua

    Abstract: Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers' preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this obje… ▽ More

    Submitted 18 September, 2023; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: This paper accepted in 14th International Conference on Decision and Game Theory for Security, GameSec 2023

  3. Cyber Deception against Zero-day Attacks: A Game Theoretic Approach

    Authors: Md Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosansky, Charles Kamhoua

    Abstract: Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "H… ▽ More

    Submitted 25 July, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

    Comments: 20 pages, 1 citation

    Journal ref: International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022

  4. arXiv:2305.00925  [pdf, other

    cs.CR cs.LG

    IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

    Authors: Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles Kamhoua

    Abstract: Over the years, honeypots emerged as an important security tool to understand attacker intent and deceive attackers to spend time and resources. Recently, honeypots are being deployed for Internet of things (IoT) devices to lure attackers, and learn their behavior. However, most of the existing IoT honeypots, even the high interaction ones, are easily detected by an attacker who can observe honeyp… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: FLAIRS-36

  5. arXiv:2304.05962  [pdf, other

    cs.GT

    Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach

    Authors: Haoxiang Ma, Shuo Han, Charles A. Kamhoua, Jie Fu

    Abstract: This paper is concerned with the optimal allocation of detection resources (sensors) to mitigate multi-stage attacks, in the presence of the defender's uncertainty in the attacker's intention. We model the attack planning problem using a Markov decision process and characterize the uncertainty in the attacker's intention using a finite set of reward functions -- each reward represents a type of th… ▽ More

    Submitted 22 June, 2023; v1 submitted 12 April, 2023; originally announced April 2023.

    Comments: This is the long version of the work "Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach" accpeted by IEEE L-CSS

  6. arXiv:2303.12367  [pdf, other

    cs.CR cs.LG math.OC

    AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices

    Authors: Volviane Saphir Mfogo, Alain Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles Kamhoua

    Abstract: The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices in order to address them before attackers seize opportunities to compromise them. The deception technique is a prominent approach to improving the security posture of IoT systems. Hon… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

    Comments: 7 pages, 7 figures

  7. arXiv:2301.01336  [pdf, other

    cs.MA

    Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

    Authors: Haoxiang Ma, Shuo Han, Nandi Leslie, Charles Kamhoua, Jie Fu

    Abstract: This paper investigates the problem of synthesizing proactive defense systems in which the defender can allocate deceptive targets and modify the cost of actions for the attacker who aims to compromise security assets in this system. We model the interaction of the attacker and the system using a formal security model -- a probabilistic attack graph. By allocating fake targets/decoys, the defender… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: Submission to AAMAS 2023

  8. arXiv:2205.12449  [pdf, other

    cs.LG cs.MA

    MAVIPER: Learning Decision Tree Policies for Interpretable Multi-Agent Reinforcement Learning

    Authors: Stephanie Milani, Zhicheng Zhang, Nicholay Topin, Zheyuan Ryan Shi, Charles Kamhoua, Evangelos E. Papalexakis, Fei Fang

    Abstract: Many recent breakthroughs in multi-agent reinforcement learning (MARL) require the use of deep neural networks, which are challenging for human experts to interpret and understand. On the other hand, existing work on interpretable reinforcement learning (RL) has shown promise in extracting more interpretable decision tree-based policies from neural networks, but only in the single-agent setting. T… ▽ More

    Submitted 11 July, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: ECML camera-ready version. 23 pages

  9. arXiv:2204.01584  [pdf, other

    math.OC cs.GT eess.SY

    Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks

    Authors: Sumukha Udupa, Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors and take control actions to reach a set of goal states while being aware of possible sensor attacks by an adversary (P2) who has perfect observations. To synthesize a provably-correct, attack-aware joint control and active sensing strategy for P1, we construct a stochastic game on graph with augmen… ▽ More

    Submitted 29 November, 2022; v1 submitted 28 March, 2022; originally announced April 2022.

    Comments: 7 pages, 3 figure, 1 table, 1 algorithm

    Journal ref: LCSS vol.7(2022)265-270

  10. arXiv:2203.03885  [pdf, other

    cs.GT

    Incentivizing Data Contribution in Cross-Silo Federated Learning

    Authors: Chao Huang, Shuqi Ke, Charles Kamhoua, Prasant Mohapatra, Xin Liu

    Abstract: In cross-silo federated learning, clients (e.g., organizations) train a shared global model using local data. However, due to privacy concerns, the clients may not contribute enough data points during training. To address this issue, we propose a general incentive framework where the profit/benefit obtained from the global model can be appropriately allocated to clients to incentivize data contrib… ▽ More

    Submitted 13 October, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  11. arXiv:2109.11637  [pdf, ps, other

    cs.GT cs.AI cs.CR cs.LG

    Learning Generative Deception Strategies in Combinatorial Masking Games

    Authors: Junlin Wu, Charles Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik

    Abstract: Deception is a crucial tool in the cyberdefence repertoire, enabling defenders to leverage their informational advantage to reduce the likelihood of successful attacks. One way deception can be employed is through obscuring, or masking, some of the information about how systems are configured, increasing attacker's uncertainty about their targets. We present a novel game-theoretic model of the res… ▽ More

    Submitted 17 June, 2022; v1 submitted 23 September, 2021; originally announced September 2021.

    Comments: GameSec 2021

  12. arXiv:2107.00003  [pdf, other

    cs.LG

    Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions

    Authors: Juan Shu, Bowei Xi, Charles Kamhoua

    Abstract: Deep neural network (DNN) is a popular model implemented in many systems to handle complex tasks such as image classification, object recognition, natural language processing etc. Consequently DNN structural vulnerabilities become part of the security vulnerabilities in those systems. In this paper we study the root cause of DNN adversarial examples. We examine the DNN response surface to understa… ▽ More

    Submitted 29 June, 2021; originally announced July 2021.

  13. arXiv:2104.00176  [pdf, ps, other

    cs.CR cs.FL cs.GT

    Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

    Authors: Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem where the agent (called Player 1, or P1) can jointly plan the control actions and sensor queries in a sensor network and an attacker (called player 2, or P2) can carry out attacks on the sensors. We model such an adversarial interaction using a formal model -- a reachability game with partially controllable observation functions. The main contribution… ▽ More

    Submitted 2 May, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 7 pages, 5 figures, Submitted to CDC2021; Revised Alg. 2 to fix a typo and notation, results unchanged

  14. arXiv:2101.10121  [pdf, ps, other

    cs.CR cs.GT cs.LG

    Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

    Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, **-Hee Cho, Charles Kamhoua, Munindar P. Singh

    Abstract: Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly popular in the research community, there has not been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various prob… ▽ More

    Submitted 8 May, 2021; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: 37 pages, 184 citations

  15. arXiv:2101.09113  [pdf, ps, other

    cs.LG

    Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions

    Authors: Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar

    Abstract: Generative adversarial networks (GANs) are often billed as "universal distribution learners", but precisely what distributions they can represent and learn is still an open question. Heavy-tailed distributions are prevalent in many different domains such as financial risk-assessment, physics, and epidemiology. We observe that existing GAN architectures do a poor job of matching the asymptotic beha… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  16. arXiv:2101.02863  [pdf, other

    cs.GT

    Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats

    Authors: Zelin Wan, **-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh

    Abstract: Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consistent views under uncertainty. They do not consider players' possible, subjective beliefs formed due to asymmetric information given to them. In this work… ▽ More

    Submitted 30 January, 2021; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: Main paper: 12 pages, 8 figures. Appendix: 7 pages, 17 figures

  17. arXiv:2011.01346  [pdf, other

    cs.SI cs.GT

    Blocking Adversarial Influence in Social Networks

    Authors: Feiran Jia, Kai Zhou, Charles Kamhoua, Yevgeniy Vorobeychik

    Abstract: While social networks are widely used as a media for information diffusion, attackers can also strategically employ analytical tools, such as influence maximization, to maximize the spread of adversarial content through the networks. We investigate the problem of limiting the diffusion of negative information by blocking nodes and edges in the network. We formulate the interaction between the defe… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

    Journal ref: GameSec 2020

  18. arXiv:2010.01208  [pdf, ps, other

    cs.GT cs.FL

    Decoy Allocation Games on Graphs with Temporal Logic Objectives

    Authors: Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie

    Abstract: We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal. A deceptive defender can allocate decoys, in addition to defense actions, to create disinformation for the attacker. Thus, we focus on the problem of jointly synthesizing a decoy placement strategy and… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: 20 page, 4 figures, 2 algorithms, Accepted at Conference on Decision and Game Theory for Security (GameSec) 2020

  19. Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

    Authors: Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating the attacker's perception. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The age… ▽ More

    Submitted 9 June, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: 6 page, 3 figures, submitted to CDC 2020/L-CSS

  20. arXiv:2002.07025  [pdf, other

    cs.GT cs.FL cs.LO

    Secure-by-synthesis network with active deception and temporal logic specifications

    Authors: Jie Fu, Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua

    Abstract: This paper is concerned with the synthesis of strategies in network systems with active cyber deception. Active deception in a network employs decoy systems and other defenses to conduct defensive planning against the intrusion of malicious attackers who have been confirmed by sensing systems. In this setting, the defender's objective is to ensure the satisfaction of security properties specified… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 16 pages, 9 figures

  21. arXiv:1908.00324  [pdf, other

    cs.CR cs.CY

    Optimal Deployments of Defense Mechanisms for the Internet of Things

    Authors: Mengmeng Ge, **-Hee Cho, Charles A. Kamhoua, Dong Seong Kim

    Abstract: Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection. Little work has taken hybrid approaches that combine different defense mechanisms in an optimal way to increase the security of the IoT against sophisticated attacks. In this work, we propose a novel approach to generate the strategic deployment of adaptive dec… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

  22. arXiv:1905.04833  [pdf, other

    cs.AI cs.CR cs.GT cs.LG

    Learning and Planning in the Feature Deception Problem

    Authors: Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles Kamhoua, Fei Fang

    Abstract: Today's high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender's loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding… ▽ More

    Submitted 8 June, 2020; v1 submitted 12 May, 2019; originally announced May 2019.

  23. arXiv:1904.03487  [pdf, other

    cs.CR

    Exploring the Attack Surface of Blockchain: A Systematic Overview

    Authors: Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

    Abstract: In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we ou… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

  24. arXiv:1903.05511  [pdf, other

    cs.GT

    Compact Representation of Value Function in Partially Observable Stochastic Games

    Authors: Karel Horák, Branislav Bošanský, Christopher Kiekintveld, Charles Kamhoua

    Abstract: Value methods for solving stochastic games with partial observability model the uncertainty about states of the game as a probability distribution over possible states. The dimension of this belief space is the number of states. For many practical problems, for example in security, there are exponentially many possible states which causes an insufficient scalability of algorithms for real-world pr… ▽ More

    Submitted 13 March, 2019; originally announced March 2019.

  25. arXiv:1811.09943  [pdf, other

    cs.CR

    Countering Selfish Mining in Blockchains

    Authors: Muhammad Saad, Laurent Njilla, Charles Kamhoua, Aziz Mohaisen

    Abstract: Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block rewards. In this paper, we explore a new form of selfish mining attack that guarantees high rewards with low cost. We show the feasibility of this attack facilitated by recent developments in blockchain technology opening new attack avenues. By outlining the limitations of existing countermeasures, we hi… ▽ More

    Submitted 17 December, 2018; v1 submitted 24 November, 2018; originally announced November 2018.

    Comments: International Workshop on Computing, Networking and Communications (CNC 2019)

  26. Enabling Cooperative IoT Security via Software Defined Networks (SDN)

    Authors: Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles Kamhoua, Kevin Kwiat

    Abstract: Internet of Things (IoT) is becoming an increasingly attractive target for cybercriminals. We observe that many attacks to IoTs are launched in a collusive way, such as brute-force hacking usernames and passwords, to target at a particular victim. However, most of the time our defending mechanisms to such kind of attacks are carried out individually and independently, which leads to ineffective an… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: IEEE ICC 2018

    Journal ref: 2018 IEEE International Conference on Communications (ICC)

  27. arXiv:1802.05832  [pdf, other

    cs.IT

    A Reputation-based Stackelberg Game Model to Enhance Secrecy Rate in Spectrum Leasing to Selfish IoT Devices

    Authors: Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles Kamhoua

    Abstract: The problem of cooperative spectrum leasing to unlicensed Internet of Things (IoT) devices is studied to account for potential selfish behavior of these devices. A distributed game theoretic framework for spectrum leasing is proposed where the licensed users can willingly lease a portion of their spectrum access to unlicensed IoT devices, and in return the IoT devices provide cooperative services,… ▽ More

    Submitted 15 February, 2018; originally announced February 2018.

    Comments: 6 Pages, IEEE INFOCOM Workshop on Advances in Software Defined and Context Aware Cognitive Networks 2018

  28. arXiv:1703.07499  [pdf, other

    cs.IT cs.CR cs.GT

    Hardware Trojan Detection Game: A Prospect-Theoretic Approach

    Authors: Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles Kamhoua, Kevin Kwiat

    Abstract: Outsourcing integrated circuit (IC) manufacturing to offshore foundries has grown exponentially in recent years. Given the critical role of ICs in the control and operation of vehicular systems and other modern engineering designs, such offshore outsourcing has led to serious security threats due to the potential of insertion of hardware trojans - malicious designs that, when activated, can lead t… ▽ More

    Submitted 21 March, 2017; originally announced March 2017.

    Comments: IEEE Transactions on Vehicular Technology

  29. arXiv:1702.06436  [pdf, ps, other

    cs.CR cs.GT

    Contract-Theoretic Resource Allocation for Critical Infrastructure Protection

    Authors: AbdelRahman Eldosouky, Walid Saad, Charles Kamhoua, and Kevin Kwiat

    Abstract: Critical infrastructure protection (CIP) is envisioned to be one of the most challenging security problems in the coming decade. One key challenge in CIP is the ability to allocate resources, either personnel or cyber, to critical infrastructures with different vulnerability and criticality levels. In this work, a contract-theoretic approach is proposed to solve the problem of resource allocation… ▽ More

    Submitted 21 February, 2017; originally announced February 2017.

    Comments: Accepted in IEEE GLOBECOM 2015

  30. arXiv:1702.00552  [pdf, other

    cs.CR

    Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence

    Authors: Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla

    Abstract: Threat intelligence sharing has become a growing concept, whereby entities can exchange patterns of threats with each other, in the form of indicators, to a community of trust for threat analysis and incident response. However, sharing threat-related information have posed various risks to an organization that pertains to its security, privacy, and competitiveness. Given the coinciding benefits an… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.

  31. arXiv:1702.00548  [pdf, other

    cs.CR

    Rethinking Information Sharing for Actionable Threat Intelligence

    Authors: Aziz Mohaisen, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla

    Abstract: In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introduc- ing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators ar… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.