1227 Words5 Pages

Incomplete information games are games in which at least one of the players is not aware of the possible payoffs and strategies for all other players or at least one other player. Incomplete information can have different scenario. In the case when the attacker has superior information and exploits defender. A mathematical model of such security scenario used to formulate a strategic game with asymmetric information in [ jon]. Incomplete and Perfect Information.
In this type of games the players have little information about their opponents’ payoff functions but they know the actions of all other players that were in the past. An example for those games is the Intrusion detection game, which is a 2-player zero-sum stochastic (Markov)*…show more content…*

Basic signaling game Patcha et. al [] presents the intrusion detection system as a basic signaling game . The defender has incomplete information because he doesn’t know what type is his opponent, which can be an attacker or a regular node. The authors define Θ as a set with elements θ and this sets represents the type of the attacker. Player 1 for example know his type and his action is α11 where α_1^1∈A^1 where A^1 is the action set for Player 1. Analogically let us assume that Player 2 will chose α_1^2∈A^2 and that he will have some prior beliefs about the type of Player 1. In other words the receiver will belief that the probability of the sender is a specific type is p(θ), where θ∈Θ. The return of player n will be similar as before, however know we will also need to consider the type of the player as a part of the reword function: B^n (s)=〖[B^n (s,a^1,a^2,θ)]〗_(α^1∈A^1,α^2∈A^2,θ∈Θ,), n=1,2 A Player 1 will have the following strategy: w^1 (s|θ) over actions α1 , conditional on the type of opponent is playing the game. Analogically for Player 2 the strategy will be represented by the following distribution function w^2 (s|a^1 ) over actions a^2 conditional on a^1. The payoff of θ with strategy w^1 (s|θ), assuming that Player 2 has played w^2 (s|a^1 ) is the following: 〖[B^1 (s,a^1,a^2,θ)]〗_(α^1∈A^1,α^2∈A^2,θ∈Θ,)=∑_(a^1)▒∑_(α^2)▒〖w^1 (s,a^1 |θ) w^2 (s,a^2 |a^1 ) 〗 B^1 (s,a^1,a^2,θ) If Player 1 plays strategy w^1 (s|θ) then Player

Basic signaling game Patcha et. al [] presents the intrusion detection system as a basic signaling game . The defender has incomplete information because he doesn’t know what type is his opponent, which can be an attacker or a regular node. The authors define Θ as a set with elements θ and this sets represents the type of the attacker. Player 1 for example know his type and his action is α11 where α_1^1∈A^1 where A^1 is the action set for Player 1. Analogically let us assume that Player 2 will chose α_1^2∈A^2 and that he will have some prior beliefs about the type of Player 1. In other words the receiver will belief that the probability of the sender is a specific type is p(θ), where θ∈Θ. The return of player n will be similar as before, however know we will also need to consider the type of the player as a part of the reword function: B^n (s)=〖[B^n (s,a^1,a^2,θ)]〗_(α^1∈A^1,α^2∈A^2,θ∈Θ,), n=1,2 A Player 1 will have the following strategy: w^1 (s|θ) over actions α1 , conditional on the type of opponent is playing the game. Analogically for Player 2 the strategy will be represented by the following distribution function w^2 (s|a^1 ) over actions a^2 conditional on a^1. The payoff of θ with strategy w^1 (s|θ), assuming that Player 2 has played w^2 (s|a^1 ) is the following: 〖[B^1 (s,a^1,a^2,θ)]〗_(α^1∈A^1,α^2∈A^2,θ∈Θ,)=∑_(a^1)▒∑_(α^2)▒〖w^1 (s,a^1 |θ) w^2 (s,a^2 |a^1 ) 〗 B^1 (s,a^1,a^2,θ) If Player 1 plays strategy w^1 (s|θ) then Player

Related

## Unequal Distribution Of Wealth, Unethical Behavior

949 Words | 4 Pagesbehavior may arise due to imbalance knowledge. Asymmetric information is perceived to be the root of unethical

## Game Theory : An Integral Part Of Human Existence

1570 Words | 7 Pagesor how to accomplish something that they want. Game theory is the study of all strategic decision making

## Media Managing Research Paper Overview

1203 Words | 5 PagesAsset pricing literature argues that information asymmetry of this sort should cause discount

## Negative Effects Of Video Games

1108 Words | 5 Pagespositive affects that video games have on us human being’s. Violent games aren’t as bad as people make

## A Study On Game Theory

3022 Words | 13 Pagesthe most difficulty and importance is the study of game theory. From the beginning of economics, mathematical

## What Is Encryption Hierarchy And How Do You Set Up An Encryption Policy Using Symmetric, Asymmetric / Certificates?

1078 Words | 5 Pagesset up an encryption policy using symmetric, asymmetric /certificates? Briefly explain When first installed

## Information And Communication Technologies Has Made Information Communication Systems

1108 Words | 5 Pagesdecades information and communication technologies have revolutionized our access to information and our

## Advantages And Disadvantages Of Digital Information Technology And Digital Multimedia Data

1351 Words | 6 Pages& Literature Survey In today’s world, recent information technology is mostly based on digital multimedia

## E Strategy For The Field Of Commerce

2563 Words | 11 Pagestactics) based on the information available at each point of time (= information set) to reduce the dispersion

## Game Theory Reflection

1116 Words | 5 PagesMy independent study on Game Theory this past semester has been an extremely rewarding experience. It