TY - GEN
T1 - Efficient computation of discounted asymmetric information zero-sum stochastic games
AU - Li, Lichun
AU - Shamma, Jeff S.
N1 - KAUST Repository Item: Exported on 2020-10-01
PY - 2016/2/29
Y1 - 2016/2/29
N2 - In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.
AB - In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.
UR - http://hdl.handle.net/10754/600891
UR - http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7402927
UR - http://www.scopus.com/inward/record.url?scp=84962019172&partnerID=8YFLogxK
U2 - 10.1109/CDC.2015.7402927
DO - 10.1109/CDC.2015.7402927
M3 - Conference contribution
SN - 9781479978861
SP - 4531
EP - 4536
BT - 2015 54th IEEE Conference on Decision and Control (CDC)
PB - Institute of Electrical and Electronics Engineers (IEEE)
ER -