TY - GEN
T1 - Efficient computation of discounted asymmetric information zero-sum stochastic games
AU - Li, Lichun
AU - Shamma, Jeff S.
N1 - Publisher Copyright:
© 2015 IEEE.
Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2015/2/8
Y1 - 2015/2/8
N2 - In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.
AB - In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.
UR - http://www.scopus.com/inward/record.url?scp=84962019172&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962019172&partnerID=8YFLogxK
U2 - 10.1109/CDC.2015.7402927
DO - 10.1109/CDC.2015.7402927
M3 - Conference contribution
AN - SCOPUS:84962019172
T3 - Proceedings of the IEEE Conference on Decision and Control
SP - 4531
EP - 4536
BT - 54rd IEEE Conference on Decision and Control,CDC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 54th IEEE Conference on Decision and Control, CDC 2015
Y2 - 15 December 2015 through 18 December 2015
ER -