-
A Game-Theoretic Analysis of Adversarial Classification
Authors:
Lemonia Dritsoula,
Patrick Loiseau,
John Musacchio
Abstract:
Attack detection is usually approached as a classification problem. However, standard classification tools often perform poorly because an adaptive attacker can shape his attacks in response to the algorithm. This has led to the recent interest in develo** methods for adversarial classification, but to the best of our knowledge, there have been very few prior studies that take into account the a…
▽ More
Attack detection is usually approached as a classification problem. However, standard classification tools often perform poorly because an adaptive attacker can shape his attacks in response to the algorithm. This has led to the recent interest in develo** methods for adversarial classification, but to the best of our knowledge, there have been very few prior studies that take into account the attacker's tradeoff between adapting to the classifier being used against him with his desire to maintain the efficacy of his attack. Including this effect is key to derive solutions that perform well in practice.
In this investigation we model the interaction as a game between a defender who chooses a classifier to distinguish between attacks and normal behavior based on a set of observed features and an attacker who chooses his attack features (class 1 data). Normal behavior (class 0 data) is random and exogenous. The attacker's objective balances the benefit from attacks and the cost of being detected while the defender's objective balances the benefit of a correct attack detection and the cost of false alarm. We provide an efficient algorithm to compute all Nash equilibria and a compact characterization of the possible forms of a Nash equilibrium that reveals intuitive messages on how to perform classification in the presence of an attacker. We also explore qualitatively and quantitatively the impact of the non-attacker and underlying parameters on the equilibrium strategies.
△ Less
Submitted 22 June, 2017; v1 submitted 17 October, 2016;
originally announced October 2016.
-
Fluid limits to analyze long-term flow rates of a stochastic network with ingress discarding
Authors:
John Musacchio,
Jean Walrand
Abstract:
We study a simple rate control scheme for a multiclass queuing network for which customers are partitioned into distinct flows that are queued separately at each station. The control scheme discards customers that arrive to the network ingress whenever any one of the flow's queues throughout the network holds more than a specified threshold number of customers. We prove that if the state of a corr…
▽ More
We study a simple rate control scheme for a multiclass queuing network for which customers are partitioned into distinct flows that are queued separately at each station. The control scheme discards customers that arrive to the network ingress whenever any one of the flow's queues throughout the network holds more than a specified threshold number of customers. We prove that if the state of a corresponding fluid model tends to a set where the flow rates are equal to target rates, then there exist sufficiently high thresholds that make the long-term average flow rates of the stochastic network arbitrarily close to these target rates. The same techniques could be used to study other control schemes. To illustrate the application of our results, we analyze a network resembling a 2-input, 2-output communications network switch.
△ Less
Submitted 15 July, 2013;
originally announced July 2013.
-
Incentive Mechanisms for Internet Congestion Management: Fixed-Budget Rebate versus Time-of-Day Pricing
Authors:
Patrick Loiseau,
Galina Schwartz,
John Musacchio,
Saurabh Amin,
S. Shankar Sastry
Abstract:
Mobile data traffic has been steadily rising in the past years. This has generated a significant interest in the deployment of incentive mechanisms to reduce peak-time congestion. Typically, the design of these mechanisms requires information about user demand and sensitivity to prices. Such information is naturally imperfect. In this paper, we propose a \emph{fixed-budget rebate mechanism} that g…
▽ More
Mobile data traffic has been steadily rising in the past years. This has generated a significant interest in the deployment of incentive mechanisms to reduce peak-time congestion. Typically, the design of these mechanisms requires information about user demand and sensitivity to prices. Such information is naturally imperfect. In this paper, we propose a \emph{fixed-budget rebate mechanism} that gives each user a reward proportional to his percentage contribution to the aggregate reduction in peak time demand. For comparison, we also study a time-of-day pricing mechanism that gives each user a fixed reward per unit reduction of his peak-time demand. To evaluate the two mechanisms, we introduce a game-theoretic model that captures the \emph{public good} nature of decongestion. For each mechanism, we demonstrate that the socially optimal level of decongestion is achievable for a specific choice of the mechanism's parameter. We then investigate how imperfect information about user demand affects the mechanisms' effectiveness. From our results, the fixed-budget rebate pricing is more robust when the users' sensitivity to congestion is "sufficiently" convex. This feature of the fixed-budget rebate mechanism is attractive for many situations of interest and is driven by its closed-loop property, i.e., the unit reward decreases as the peak-time demand decreases.
△ Less
Submitted 29 May, 2013;
originally announced May 2013.
-
A Game-Theoretical Approach for Finding Optimal Strategies in an Intruder Classification Game
Authors:
Lemonia Dritsoula,
Patrick Loiseau,
John Musacchio
Abstract:
We consider a game in which a strategic defender classifies an intruder as spy or spammer. The classification is based on the number of file server and mail server attacks observed during a fixed window. The spammer naively attacks (with a known distribution) his main target: the mail server. The spy strategically selects the number of attacks on his main target: the file server. The defender stra…
▽ More
We consider a game in which a strategic defender classifies an intruder as spy or spammer. The classification is based on the number of file server and mail server attacks observed during a fixed window. The spammer naively attacks (with a known distribution) his main target: the mail server. The spy strategically selects the number of attacks on his main target: the file server. The defender strategically selects his classification policy: a threshold on the number of file server attacks. We model the interaction of the two players (spy and defender) as a nonzero-sum game: The defender needs to balance missed detections and false alarms in his objective function, while the spy has a tradeoff between attacking the file server more aggressively and increasing the chances of getting caught. We give a characterization of the Nash equilibria in mixed strategies, and demonstrate how the Nash equilibria can be computed in polynomial time. Our characterization gives interesting and non-intuitive insights on the players' strategies at equilibrium: The defender uniformly randomizes between a set of thresholds that includes very large values. The strategy of the spy is a truncated version of the spammer's distribution. We present numerical simulations that validate and illustrate our theoretical results.
△ Less
Submitted 3 July, 2012;
originally announced July 2012.
-
Unilateral Altruism in Network Routing Games with Atomic Players
Authors:
Amar Prakash Azad,
John Musacchio
Abstract:
We study a routing game in which one of the players unilaterally acts altruistically by taking into consideration the latency cost of other players as well as his own. By not playing selfishly, a player can not only improve the other players' equilibrium utility but also improve his own equilibrium utility. To quantify the effect, we define a metric called the Value of Unilateral Altruism (VoU) to…
▽ More
We study a routing game in which one of the players unilaterally acts altruistically by taking into consideration the latency cost of other players as well as his own. By not playing selfishly, a player can not only improve the other players' equilibrium utility but also improve his own equilibrium utility. To quantify the effect, we define a metric called the Value of Unilateral Altruism (VoU) to be the ratio of the equilibrium utility of the altruistic user to the equilibrium utility he would have received in Nash equilibrium if he were selfish. We show by example that the VoU, in a game with nonlinear latency functions and atomic players, can be arbitrarily large. Since the Nash equilibrium social welfare of this example is arbitrarily far from social optimum, this example also has a Price of Anarchy (PoA) that is unbounded. The example is driven by there being a small number of players since the same example with non-atomic players yields a Nash equilibrium that is fully efficient.
△ Less
Submitted 12 August, 2011; v1 submitted 4 August, 2011;
originally announced August 2011.
-
Model of an International Environmental Agreement among Asymmetric Nations applied to Debris Mitigation
Authors:
Michael J. Singer,
John T. Musacchio
Abstract:
We investigate how ideas from the International Environmental Agreement (IEA) literature can be applied to the problem of space debris mitigation. The problem of space debris is similar to other international environmental problems in that there is a potential for a tragedy of the commons effect--individual nations bear all the cost of their mitigation measures but share only a fraction of the ben…
▽ More
We investigate how ideas from the International Environmental Agreement (IEA) literature can be applied to the problem of space debris mitigation. The problem of space debris is similar to other international environmental problems in that there is a potential for a tragedy of the commons effect--individual nations bear all the cost of their mitigation measures but share only a fraction of the benefit. Consequently, nations have a tendency to underinvest in mitigation. Coalitions of nations, brought together by IEAs, have the potential to lessen the tragedy of the commons effect by pooling the costs and benefits of mitigation. This work brings together two recent modeling advances: i) a game theoretic model for studying the potential gains from IEA cooperation between nations with asymmetric costs and benefits, ii) an orbital debris model that gives the societal cost that specific actions, such as failing to deorbit an inactive satellite, have on the environment. We combine these two models with empirical launch share data for a "proof of concept" of an IEA for a single mitigation measure, deorbiting spacecraft at the end of operational lifetime. Simulations of all possible coalitions for a proxy set of 12 asymmetric nations suggest the possibility that stable coalitions can provide significant deorbiting gains relative to nations acting in the absence of an IEA coalition.
△ Less
Submitted 21 March, 2010;
originally announced March 2010.