A presentation at Black Hat USA in in Las Vegas, NV, USA by Kelly Shortridge
We all groan when we hear it’s “time for some game theory,” but traditional game theory – modelling conflict and cooperation between rational decision-makers – still pervades how we think of defensive strategy as an industry. This primitive analysis is a disservice to defenders, who are facing humans (and who are, in fact, humans themselves), but are modelling their own actions and opponent’s actions based on the assumption of machine-like behavior.
In this session, I will examine traditional game theory and propose why behavioral game theory should take its place in the philosophy of defense. Next, I’ll review the first principles of game theory, through the lens of behavioral game theory, which empirically measures how humans actually behave in games, rather than assumes they will behave coldly rational.
I’ll explain the “rules” of the information security game and how traditional game theory is poorly suited to those conditions, along with the various behavioral models and why they are a superior fit. I’ll then explore the two primarily methods that play into how humans make decisions in games – “thinking” and “learning” and what empirical data from behavioral game theory studies suggests on how to improve thinking and learning, extrapolating to applications for infosec defenders.
Finally, I’ll present new insights from my own research, examining how defenders and attackers play the infosec game specifically, and bridging from theory to practice, to see how the lessons from behavioral game theory can be tangibly incorporated into defenders’ strategic decision making processes. I’ll conclude the session by outlining the practical steps for improving threat modelling, countering offensive moves, and deciding which products to use, so that defenders can start gaining the high ground in the infosec game.
Also presented at BSides PDX 2017.
PDF: https://swagitda.com/speaking/us-17-Shortridge-Big-Game-Theory-Hunting.pdf
The following resources were mentioned during the presentation or are useful additional information.
Citation of this talk by the BBC
Brandenburger, A. M., & Nalebuff, B. J. (2011). Co-opetition. Crown Business.
Huck, S. (Ed.). (2004). Advances in understanding strategic behaviour: Game theory, experiments and bounded rationality. Springer.
Veksler, V. D., & Buchler, N. (2016). Know Your Enemy: Applying Cognitive Modeling in Security Domain. In CogSci.
Abbasi, Y., Kar, D., Sintov, N., Tambe, M., Ben-Asher, N., Morrison, D., & Gonzalez, C. (2016, August). Know Your Adversary: Insights for a Better Adversarial Behavioral Model. In CogSci.
Payyappalli, V. M., Zhuang, J., & Jose, V. R. R. (2017). Deterrence and risk preferences in sequential attacker–defender games with continuous efforts. Risk Analysis, 37(11), 2229-2245.
He, X., Dai, H., & Ning, P. (2015, April). Improving learning and adaptation in security games by exploiting information asymmetry. In 2015 IEEE Conference on Computer Communications (INFOCOM) (pp. 1787-1795). IEEE.
Schultz, W. (2006). Behavioral theories and the neurophysiology of reward. Annu. Rev. Psychol., 57, 87-115.
Measuring Security by Dan Geer
Here’s what was said about this presentation on social media.