2018
DOI: 10.3390/e21010023
|View full text |Cite
|
Sign up to set email alerts
|

Detection Games under Fully Active Adversaries

Abstract: We study a binary hypothesis testing problem in which a defender must decide whether a test sequence has been drawn from a given memoryless source P 0 , while an attacker strives to impede the correct detection. With respect to previous works, the adversarial setup addressed in this paper considers an attacker who is active under both hypotheses, namely, a fully active attacker, as opposed to a partially active attacker who is active under one hypothesis only. In the fully active setup, the attacker dis… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…The corresponding operation detection relies on destructive ability of the following operations. That process is similar to the game [30] between the forensics analyst and the attacker. In the real scenario, the multiple operations are applied sequentially rather than the anti-forensics attack.…”
Section: Problem Formulationmentioning
confidence: 95%
“…The corresponding operation detection relies on destructive ability of the following operations. That process is similar to the game [30] between the forensics analyst and the attacker. In the real scenario, the multiple operations are applied sequentially rather than the anti-forensics attack.…”
Section: Problem Formulationmentioning
confidence: 95%
“…For example, detecting attacks, anomalies, and malicious behavior in network security can be analyzed under the game theoretic perspective [2][3][4][5][6]. In this direction, the hypothesis testing and the game theory approaches can be utilized together to investigate attacker-defender type applications [7][8][9][10][11][12][13], multimedia source identification problems [31], inspection games [32][33][34], and deception games [35]. In [8], a Nash equilibrium of a zero-sum game between Byzantine (compromised) nodes and the fusion center (FC) is investigated.…”
Section: Related Literaturementioning
confidence: 99%
“…The strategy of the FC is to set the local sensor thresholds that are utilized in the likelihood-ratio tests, whereas the strategy of Byzantines is to choose their flipping probability of the bit to be transmitted. In [9], a zero-sum game of a binary hypothesis testing problem is considered over finite alphabets. The attacker has control over the channel, and the randomized decision strategy is assumed for the defender.…”
Section: Related Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Batch acceptance relates to the more general problem of hypothesis testing (French and Ríos Insua, 2000), which has been extensively studied from a decision theoretic perspective. However, lately, there has been a growing concern about the impact of adversaries in this realm, with recent examples in fields such as adversarial classification (Yu et al, 2018), adversarial machine learning (Jagielski et al, 2018) or adversarial signal processing (Tondi et al, 2019). This consideration of an adversarial component also applies to the more specific batch acceptance framework, where rational opponents have been incorporated to the aforementioned contexts as in Tapiero (1995) (acceptance sampling), Haphuriwat et al (2011) (cargo container screening) and Kantarcioglu et al (2011) (spam detection).…”
Section: Introductionmentioning
confidence: 99%