The transmission process of information among computers of network is considered as the procedure of interactive behaviors. In this article, we present a mean field game model for the binary interactive behaviors between the malicious attackers and the defenders. We first discuss the evolution of the states of the malicious attackers and the defenders using the susceptiable-infective-Removal epidemic model in which we take into account the stochastic process of the propagation of the infected computers and the attack intensity. Then, we formulate the mean field game consistency stability problem generated by a Hamilton–Jacobi–Bellman equation of the individual player and the fixed-point problem. Finally, we derive the optimal individual strategy with an appropriate assumption that the response time of the defense system is faster than the infection rate.
Rapid development of the computer technology has influenced all aspects of people’s daily life. Individuals usually store and utilize their daily data using online and offline technologies. This sort of stored information becomes the main target of hackers. It has been discussed online that there are many different kinds of cyber-attacks such as malware, denial-of-service (DoS) attacks, hacking the data, email bombing, and targeted attack.1 Therefore, it is required to develop efficient defense strategies to prevent these attacks arising every now and then.
Various approaches have been considered to prevent the cyber-attacks, including the firewall, anti-virus program, and intrusion detection system (IDS).2–6 For instance, Khouzani et al.4 proposed an optimal control model to discuss the damage maximization problem inflicted by the malware attack, which minimized the overall cost of the security patches. Huang et al.5 transformed the targeted attacks into random attacks to study the robustness of the interdependent networks. Then, Zargar et al.6 classified the current distributed denial-of-service (DDoS) flooding attacks and introduced a comprehensive DDoS defense mechanism.
Game theory has been introduced for the defense strategy in cyber security problems.2,7 This method presents a useful mathematical tool for analyzing decision problems for multiple players. The outcome of each player depends on both his decisions and others’ decisions. In cyber security problems, an effective security model depends on the defense strategies and the actions of the attackers. Bedi et al.8 modeled the probability actions between the attackers and the defenders as a static game for defending against the DDoS attack. In the study of Dingankar and Brooks,9 DDoS attacks were modeled as a non-cooperative game in which the defenders tried to form an optimum network topology to prevent the attack, while the attackers tried to deploy the zombies in the network.
Integration of the interactive behaviors among the attackers, defenders and users with game theoretic approach is proposed in Ryutov et al.10 The advantage is that for the first time, users are considered as the independent players, where their incentives and behaviors affect the game process. An optimal defense strategy based on the stochastic game theoretic scheme is reported in Jiang et al.11 Farhang et al.12 modeled a Bayesian game to analyze the interactions between a server and its end user, that is, either a legitimate user or an attacker, where the optimal strategy of the defender only depends on the attackers.
Despite the efforts of the current researches and the contribution they have made for the security problems, most of the existing researches modeled a security game scheme with only two players. In such a scenario, all attackers are considered as one attacker, as is the whole of defenders. This assumption is not suitable for the real cyber environment with the security problems represented by multiple attackers and multiple defenders. Therefore, we form a mean field game model to discuss the individual optimal strategy in this article, while taking into account the dynamic evolution of each individual player.
Mean field games have been created by Lasry and Lions13 and Huang et al.14 as a method to model the games with large players. The systems are coupled through Hamilton–Jacobi–Bellman (HJB) and Kolmogorov equations, in which the HJB equation describes the behavior of the individual strategy, while the Kolmogorov equation discusses the evolution of the individual optimal strategy. Mean field game is also applied by economics,15 engineering in different areas,16 communication networks,17,18 and other fields.19,20 A mean field game model for cyber security is proposed in Wang et al.21 and Kolokoltsov and Malafeyev.22 The work of Wang et al.21 considered an attacker and multiple defenders in mobile ad hoc networks. The legitimate nodes of such a model may select actions intelligently to decrease their energy consumption and security loss. Kolokoltsov and Malafeyev22 proposed a basic mean field game consistency problem to discuss the botnet defense problem, while they did not consider the individual strategy.
Inspired by Kolokoltsov and Malafeyev22 and Gomes et al.,23,24 we introduce a simple mean field game model for the cyber security problems. Different from the current works, the proposed model is a solvable mean field game model for infinite computers. The contributions of this article are as follows: we first study the binary interactive behaviors of the states of the attackers and defenders using the susceptible–infectious–removed (SIR) epidemic model, in which we take into account the stochastic process of the propagation of the infected users and attack intensity. Then, existence of the solutions of this model will be investigated. Next, we formulate the mean field game consistency stability problem generated by a HJB equation of the individual player and the fixed-point problem. Finally, the existence and stability of the solutions of the mean field game model and the optimal individual strategy will be considered. The proposed model evaluates non-uniqueness of the solutions that is investigated in the mean field game theory. Moreover, the proposed model may help understand the link between the dynamic and stationary mean field games models.
The article is organized as follows. We present the dynamic evolution of the states of the nodes with SIR epidemic model and elaboration of the mean field game consistency stability problem in section “System model.” Then, section “Analysis of the solutions of HJB equation” analyzes existence of the optimal individual defense strategy of the HJB equation. Next, section “Stability of the solutions” provides the stability of the solutions of the optimal individual defense strategy. Finally, section “Conclusion” concludes the article.
System model
We presume that any computer in the network may operate in three states, that is, infective (I), susceptible (S), and recovery (R). The infective node shows the infected computer by the malicious attacks and a susceptible node is prone to be, but not infected. The node R represents the recovery which is immune to any malicious attacks, and we assume that the nodes have the defensive systems. In this framework, we presume both computers and their interactive behaviors among them satisfy the stochastic distribution and depend on the attack intensity , and the changes in the states between I (S) and R depend on the decisions of computers.
We consider , , and as the numbers of the nodes of different states, at time t, where the total numbers of the nodes in the network are represented by N, and is a non-negative integer. Then, . We define as the standardized state of , where and . Considering all participants have the same strategy and the values are defined as 0 and 1, where each node likes to switch to .
We assume represents the infection rate of the susceptible nodes under the direct attacks in which is a constant. Besides, infective nodes will infect the susceptible nodes by transmitting the malware, while susceptible nodes will transmit the defensive systems to infective nodes to cure them. Hence, we consider and as the interaction probabilities between the infected and susceptible nodes, where and denote the number of the interactions of the nodes. The recovery probabilities of the infected and susceptible nodes are denoted by and , respectively, and exhibits the probability of the immune nodes transformed to the susceptible nodes. The specific transitions between different states are discussed in Figure 1.
The transitions between different states.
The set of differential equations of the system, showing the evolution of the state of the infinite players, reads
where is the attack intensity and represents the reaction rates of the defense systems, so that for , the system may react immediately. and are the active strategy and the passive strategy of the nodes, respectively, where their values are defined as 0 and 1. denotes the evolution of the susceptible nodes under the directed attacks, means that the susceptible nodes are infected by the infected nodes with the number , while shows the infected nodes are recovered by the susceptible nodes with the number , indicates that the dynamic evolution of the nodes under the reaction rate of the defense systems, and denotes that the infected nodes are immune to the malicious attacks.
It can be shown that for the states of the susceptible nodes transformed into the infected or immune nodes, it reads , , or .25Equation (1) discussed the evolution of the states with infinite nodes, and the finite state space of the nodes can be written as , so we get the evolution of the finite state space of the nodes
where . For the standardized state , there exists a set of normal basis , so that equation (2) may be expressed as a vector function as
Next, we will introduce the convergence conditions of the differential equation (3) in the .
Proposition 2.1
If , then , where
represents a first-order partial differential equation.
Moreover, we can analyze the evolution of each individual behavior of participants using the Markov model. We define as the individual strategy; then, the dynamic evolution of the individual participant with three states can be discussed as
where , , and denote the individual average cost of the nodes.
We presume that the profit function of the attacker, , depends on the states’ distribution of the nodes and the payment per unit time of the network attacker, . Attackers will maximize their profits during the game time, and therefore, the profit function at time is
We define as the payoff per unit time of the susceptible nodes, as the payoff per unit time of the infected nodes, and as the payment per unit time of the immune nodes. denotes the loss per unit time of the infected nodes. The nodes will minimize their cost functions, and hence, the total payoff functions can be expressed as
where , , , denote the indicator functions of the states, and is the number of times of the nodes from to during the period.
We will get the solutions of the dynamic equation (1) and the payment function (5) if we achieve the optimal attack intensity and the optimal trajectory . In contrast, for determined and , the players will derive the optimal individual strategy by solving equations (5) and (7). Hence, we form a mean field game consistency equation to analyze the optimal individual strategy of the nodes at game time , that is
where and .
In general, this mean field game problem is discussed by studying the average payment , in which the form of the solutions to the HJB equation satisfies . Hence, HJB equation (5) can be written as follows
where u is the optimal average payment function.
If we derive the stable solutions from equations (1) and (9), the optimal individual strategy will be formed in equation (9), in which are the maximization values of equation (9) and are the stable solutions of equation (1). The individual optimal strategy depends on the stable solutions which satisfy the following equation
Analysis of the solutions of HJB equation
In this section, we elaborate the solutions of the mean field consistency problem (8) with and , respectively. If , the infected node will choose its active defense behavior to reduce its payoff and the susceptible node may not change its state. If , the passive defense behavior will be optimal. We discuss the existence of the individual optimal solutions of HJB equation in equation (9) with few assumptions, that is, , , and .
If , we consider and . Then, the optimal individual strategy is the active defense behavior. Equation (9) can be written as
To simplify, we consider because the solution, , of equation (7) may be expressed as the addictive constant. We achieve . Then, equation (11) reduces to
and then, inserting equation (17) into the second equation of equation (16) results in a quadratic equation in terms of as
Since yields and on intervals , therefore there exists so that holds. Thus, is the optimal solution that satisfies equation (15) if and only if . Hence, we derive the following proposition.
Proposition 3.1
If and , there exists a unique solution for the mean field game consistency problem in equations (9) and (10), where and are the unique solutions of equation . In this framework, we get the optimal individual strategy of the active defense behavior.
For , we consider and , so that the optimal individual strategy is the passive defense behavior. Then, equation (9) simplifies to
and then inserting equation (26) into the second equation of equation (25) leads to the quadratic equation in terms of as
Since yields and on intervals , therefore there exists so that holds. We derive the following proposition.
Proposition 3.2
If , there exists several solutions for the mean field game consistency stability problem in equations (9) and (10), that is, if , then , , and are always the solution. Moreover, if and , then there exists so that and generated by equation (26). In this framework, we obtain the optimal individual strategy of the passive defense behavior.
Stability of the solutions
In this section, we analyze the stability of the solutions. The solutions are stable if and only if all eigenvalues of the characteristic equations generated by them present negative real parts. Therefore, we perform a linear approximation for the system of equation (1) with the optimal solutions and , respectively.
In order to analyze the stability of the fixed solution , we consider and , and the system of equations in equation (28) reads
The problem of the eigenvalues presents negative real parts which are equivalent to the negative trace of the characteristic equation and the positive determinant of the characteristic equation. Therefore, we need to discuss the following inequality holds
For , we see that equation (26) always holds for any positive , and the eigenvalues of the characteristic equations present negative real parts. Hence, the solution is stable.
For , it is seen that equation (26) always holds for any positive , where the eigenvalues of the characteristic equations have negative real parts. Hence, the solution is stable if .
Conclusion
In this article, a simple security mean field game model for the binary interactive behaviors between the malicious attackers and the defenders was investigated in cyber security. We formed the optimal individual defense strategy. The evolution of the states of the malicious attackers and the defenders was modeled using the SIR epidemic model, and the mean field game consistency stability problem was generated by an HJB equation of the individual player and the stable point problem. In our model, we took into account both stochastic process of the propagation of the infected players and attack intensity. Existence and stability of solutions of the mean field game model were elaborated in two scenarios, that is, and , assuming that players are distributed with the three states, and we derived the optimal individual strategy of the active defense behavior and the passive defense behavior, respectively.
Footnotes
Appendix 1
Acknowledgements
The authors gratefully acknowledge the anonymous reviewers who read drafts and made many helpful suggestions.
Handling Editor: Kim-Kwang R Choo
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China under grant no. 1603116.
References
1.
ChowdhuryA. Recent cyber security attacks and their mitigation approaches—an overview. In: International conference on applications and techniques in information security, Cairns, QLD, Australia, 26–28 October 2016, pp.54–65. New York: Springer.
2.
LiangXXiaoY. Game theory for network security. IEEE Commun Surv Tut2013; 15(1): 472–486.
3.
ZhangHGHanWBLaiXJet al. Survey on cyberspace security. Sci China Inform Sci2015; 58(11): 1–43.
4.
KhouzaniMHRSarkarSAltmanE. Maximum damage malware attack in mobile wireless networks. IEEE ACM T Network2012; 20(5): 1347–1360.
5.
HuangXGaoJBuldyrevSVet al. Robustness of interdependent networks under targeted attack. Physical Review E2011; 83(6): 065101.
6.
ZargarSTJoshiJTipperD. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut2013; 15(4): 2046–2069.
7.
AlpcanTBaşarT. Network security: a decision and game-theoretic approach. Cambridge: Cambridge University Press, 2010.
8.
BediHShivaSRoyS. A game inspired defense mechanism against distributed denial of service attacks. Secur Commun Netw2014; 7(12): 2389–2404.
9.
DingankarCBrooksRR. Denial of service games. In: Third annual cyber security and information infrastructure research workshop, Oak Ridge, TN, 15–17 May 2007, pp.7–17.
10.
RyutovTOroszMBlytheJet al. A game theoretic framework for modeling adversarial cyber security game among attackers, defenders, and users. In: International workshop on security and trust management, Vienna, 21 September 2015, pp.274–282. New York: Springer.
11.
JiangWTianZZhangHet al. A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. In: 2008 IEEE international conference on networking, sensing and control, Sanya, China, 6–8 April 2008, pp.648–653. New York: IEEE.
12.
FarhangSManshaeiMHEsfahaniMNet al. A dynamic Bayesian security game framework for strategic defense mechanism design. In: International conference on decision and game theory for security, Los Angeles, CA, 6–7 November 2014, pp.319–328. New York: Springer.
13.
Jeanmichel LasryPLLionsPL. Jeux à champ moyen. I - Le cas stationnaire[J]. Comptes rendus - Mathématique2006; 343(9): 619–625.
14.
HuangMMalhameRPCainesPE. Large population stochastic dynamic games: closed-loop McKean-Vlasov systems and the Nash certainty equivalence principle. Commun Inf Syst2006; 6: 221–251.
15.
GuéantO. Mean field games and applications to economics. PhD Thesis, Université Paris-Dauphine, Paris, 2009.
16.
DjehicheBTcheukamATembineH. Mean-field-type games in engineering. arXiv:1605.03281, September2016.
17.
MériauxFVarmaVLasaulceS. Mean field energy games in wireless networks. 2012 conference record of the forty sixth asilomar conference on signals, systems and computers, Pacific Grove, CA, 4–7 November 2012, pp.671–675. New York: IEEE.
18.
TembineHVilanovaPDebbahM. Noisy mean field stochastic games with network applications. Report, Ecole superieure d’electricite, Paris, December2010.
19.
BausoDTembineHBaşarT. Opinion dynamics in social networks through mean-field games. SIAM J Control Optim2016; 54(6): 3225–3257.
20.
GuéantOLasryJMLionsPL. Mean field games and applications. In: CousinACrépeySGuéantOet al. (eds) Paris-Princeton lectures on mathematical finance 2010. Berlin, Heidelberg: Springer-Verlag, 2011, pp.205–266.
21.
WangYYuFRTangHet al. A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE T Wirel Commun2014; 13(3): 1616–1627.
22.
KolokoltsovVNMalafeyevOA. Corruption and botnet defense: a mean field game approach. arXiv:1607.07350, July2016.
23.
GomesDAMohrJSouzaRR. Discrete time, finite state space mean field games. J Math Pure Appl2010; 93(3): 308–328.
24.
GomesDAMohrJSouzaRR. Continuous time finite state mean field games. Appl Math Opt2013; 68(1): 99–143.
25.
KolokoltsovVN. Nonlinear Markov games on a finite state space (mean-field and binary interactions). Int J Stat Probab2012; 1(1): 77–91.