SlideShare a Scribd company logo
1 of 36
Download to read offline
Games We Play
Defenses and Disincentives
Allison Miller
Overview
Overview of econ & game theory concepts

Game theory games

Infosec issues as games

Designing games to win

Walk-through a defense built on
disincentives

Wrap-up
Economics applied to security
Utility theory

Externalities 

Information Asymmetries

Signaling 

Marginal cost
Game theory
Branch of applied mathematics

Studies decisions made by players
interacting (or competing)

- Scenarios have rules and pay-offs

- Costs & benefits dependent on decisions of other
players

Used as a framework in economics, comp
sci, biology, & philosophy

- Also business, negotiation, and military strategy
Discussing Games
Mechanics of a payoff matrix
Player 2
A B
Player 1
A A1, A2 A1, B2
B B1, A2 B1, B2
Discussing Games
Mechanics of decision trees
UP
DOWN
CIRCLE
RED
BLUE
MARIO
LUIGI
KIRBY
GIZMO
10, 3
2, 10
2, 5
-3, 3
A
B
B
A
A
A
Typical game theory "games"
Chicken / Brinkmanship

- Push it to the edge

Volunteer’s Dilemma

- For the greater good

Tragedy of the Commons

- Share and share alike (cumulative effect of
cheating)

Prisoner’s Dilemma
Discussing Games
Prisoner’s Dilemma
Player 2
Keep quiet Confess
Player 1
Keep
quiet
-1, -1

Mutual cooperation
0, -10

Individual defection
Confess -10, 0

Individual defection
-3, -3

Mutual punishment
Predicting outcomes
Cooperation

Defection

Dominant
strategies

Equilibrium
Nash Equilibrium
Equilibrium is reached when:

- Players in a game have selected a strategy

- Neither side can change it’s strategy
independently & improve position

Optimal solution in games with limited
outcomes
Discussing Games
Prisoner’s Dilemma
Player 2
Keep quiet Confess
Player 1
Keep
quiet
-1, -1

Mutual cooperation
0, -10

Individual defection
Confess -10, 0

Individual defection
-3, -3

Mutual punishment
Setting up risk problems as games
Identify players in the game

Clarify the “rules”

Show me your moves

Describe payoffs

Single move or repeated game
Discussing Games
Tragedy of the Commons: Spam, Bandwidth usage
Everyone else’s choices
> n choose wise
usage
Less than n choose
wise usage
Individual
choice
Use
resource
wisely
Cost, but
social benefit

Mutual cooperation
Cost

(Subsidize social
use)
Overuse
resource
Social benefit

(Benefit w/o cost)
0

Resources depleted
Discussing Games
Chicken/Brinkmanship: Vulnerability Disclosure
Vulnerability Researcher
Report Exploit
Asset
Owner
Reward /
Respond
0, 0

Responsible
disclosure
-2, +2

Early disclosure
Ignore /
Deny
+2, -2

Defer vulnerability
-10, -10

0-day go boom
Discussing Games
Volunteer’s Dilemma: Data breach cost info sharing
All other victims
At least one
shares
All keep quiet
Victim
Share 0 0

Cost, limited benefit
Keep
quiet
1

Benefit w/o cost
-10

Everyone’s in the
dark
How games are won
Clarify dominant strategies

Find equilibrium

Pursue equilibrium or change the
payoffs
Moves
Current game-play

- Controls are layered or chained until we're satisfied that for some set of attackers,
the cost of the attack is higher than the utility associated with their payoff 

Reputation requirements for participation

Role requirements for participation (access control) 

Incremental authentication

Content/context based filtering

Blacklisting / whitelisting

Rate limiting 

Bot limiters (Captcha)

Obfuscation/Encryption
Counter-moves
For every move there is
a counter-move
Putting the pieces on the board
The amount of friction inserted into the
system depends on:

- Value of asset to the owner

- Value of the asset to potential attackers

- Number of attackers expected

- Portion of attacks that must be averted

- Disincentive value of each layer of friction for an
attacker

Now it’s time to play our game
Does this sound familiar?
Managing Decisions
Game Theory is a framework for studying decisions

- Since payoffs depends on the choices of other players, moves
are risky

- Players play based on their risk appetite

- Risk management = decision management

Defenders design control systems that make decisions

- Where risks manifest in observable behavior

- That make moves/counter-moves depending on the context
and understanding of an actor’s identity or intent

- Where system or individual costs/payoffs depend on the
outcome of an actor’s actions
SHALL WE PLAY A GAME?
(SINCE WE CAN’T PLAY “CLUE” FOR EVERY LOGIN
TRANSACTION
NEW USER
MESSAGE
FRIEND REQUEST
ATTACHMENT
PACKET
WINK
POKE
CLICK
WE BUILD RISK MODELS)
Applying Decisions
Risk management is
decision management
ACTOR
ATTEMPTS
ACTION
SUBMIT
WHAT IS THE
REQUEST
HOW TO
HONOR THE
REQUEST
SHOULD WE
HONOR?
RESULT
ACTION
OCCURS
Not all risk decisions have a
competitive element, but all
competition / games have risks
Create account using fake identity
Script completion of verifications
Outsource captcha
Create accounts across virtual
devices
Distribute creation of accts using
botnet
Scrape identities from public sites
Age accounts, then reactivate
Use stolen credentials
Defraud verification process
...
Require email verification
Test for human behind keyboard
Rate limit by device ID
Rate limit by IP/location
Look for similarities across
accounts
Require reputation level to
proceed
Filter for content / context, add
auth challenge
Require manual verification
Manual review of account/event
...
Except one small thing...
...what kind of game is this?
Multi-player Mode
Offense
Attempt Success
Defense
Deflect
4, 4
 0, 10

Ignore
10, 0
 1, 1
 Offense
Attempt Success
Defense
Deflect
4, 4
 0, 10

Ignore
10, 0
 1, 1
Offense
Attempt Success
Defense
Deflect
4, 4
 0, 10

Ignore
10, 0
 1, 1

Offense
Attempt Success
Defense
Deflect
4, 4
 0, 10

Ignore
10, 0
 1, 1

Attackers are not the only players in
the game

Legitimate users that are also
affected by added friction
Team Dynamics
So this adds another factor into the
appropriate level of friction question,
which is:

- Disincentive value of each layer of friction for
an innocent

- Likelihood the disincentive will be incorrectly
applied to an innocent

- Likelihood the disincentive value > payoff
value for the innocent (go find a new game)
Decisions, Decisions
Authorize Block
Good
false
positive
Bad
false
negative
RESPONSE
POPULATION
Incorrect decisions have a cost 

Correct decisions are free (usually)
Good Action
Gets
Blocked
Bad Action
Gets
Through
Downstream
Impacts
GAME OVER
1-UP?
Why are we still playing?
Economic/mathematical models
depend on rational participants

Free will doesn’t imply rationality

Economics studies what should
happen, behavioral economics
studies what does happen
Example of rational irrationality
Ultimatum Game

- Player A given $1000

Player A needs to split the $ with Player B

Player A gets to choose the split

- Player B receives offer

If B accepts, both get $

If B rejects, both get 0
Take it or leave it
Outcomes

- Player A’s usually offer ~50%

- Player B’s often reject if offered <30%

- This behavior occurs across cultures, levels of wealth

Emotions matter

- Heightened brain activity in 

Bilateral antierior insula (disgust) w/low offers

Dorsolateral prefrontal cortext (cognitive decision making)
w/high offers

- Fairness, Fear, Punishing the mean
Therefore: Winning strategies
depend on understanding behavior
Both attackers and defenders may exhibit bias when
making decisions - about the game and other players

Retrofit conceptual models to actual experiences

Fill in the blanks on player costs/payoffs

Risk controls still either need to

- Change friction (cost), or

- Change expected value of pay-off

Continue to analyze game dynamics over time 

- Low-risk, high frequency interactions (data) 

- High-risk, low frequency interactions (negotiation)
Prediction is very difficult, especially
about the future
Niels Bohr
Allison Miller
@selenakyle
Some references
Axelrod, Robert. The Evolution of Cooperation.

Dixit, Avinash and Nalebuff, Barry. The Art of Strategy: A
Game Theorist’s Guide to Success in Business and in Life.

Fisher, Len. Rock, Paper, Scissors: Game Theory in
Everyday Life.

Gibbons, Robert. Game Theory for Applied Economists.

Meadows, Donella. Thinking in Systems: A Primer.

Wikipedia’s sections on Game Theory, Economics, &
Probability.

More Related Content

What's hot

Advanced Game Theory guest lecture
Advanced Game Theory guest lectureAdvanced Game Theory guest lecture
Advanced Game Theory guest lectureJonas Heide Smith
 
Game theory application
Game theory applicationGame theory application
Game theory applicationshakebaumar
 
An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game TheoryPaul Trafford
 
Ssrn a brief inrtoduction to the basic of game theory
Ssrn a brief inrtoduction to the basic of game theorySsrn a brief inrtoduction to the basic of game theory
Ssrn a brief inrtoduction to the basic of game theoryYing wei (Joe) Chou
 
Lecture 1 - Game Theory
Lecture 1 - Game TheoryLecture 1 - Game Theory
Lecture 1 - Game TheoryLuke Dicken
 
Game theory project
Game theory projectGame theory project
Game theory projectAagam Shah
 
Applications of game theory on event management
Applications of game theory on event management Applications of game theory on event management
Applications of game theory on event management Sameer Dhurat
 
Introduction to Game Theory
Introduction to Game TheoryIntroduction to Game Theory
Introduction to Game TheoryCesar Sobrino
 
Prisoner's Dilemma
Prisoner's DilemmaPrisoner's Dilemma
Prisoner's DilemmaAcquate
 
Exposé biad game-theory
Exposé biad game-theoryExposé biad game-theory
Exposé biad game-theoryMalak Souf
 
A brief introduction to the basics of game theory
A brief introduction to the basics of game theoryA brief introduction to the basics of game theory
A brief introduction to the basics of game theoryYing wei (Joe) Chou
 
Game Theory - An Introduction (2009)
Game Theory - An Introduction (2009)Game Theory - An Introduction (2009)
Game Theory - An Introduction (2009)mattbentley34
 

What's hot (20)

Game theory
Game theoryGame theory
Game theory
 
Advanced Game Theory guest lecture
Advanced Game Theory guest lectureAdvanced Game Theory guest lecture
Advanced Game Theory guest lecture
 
Game theory application
Game theory applicationGame theory application
Game theory application
 
An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game Theory
 
Ssrn a brief inrtoduction to the basic of game theory
Ssrn a brief inrtoduction to the basic of game theorySsrn a brief inrtoduction to the basic of game theory
Ssrn a brief inrtoduction to the basic of game theory
 
Game theory in Economics
Game theory in EconomicsGame theory in Economics
Game theory in Economics
 
Lecture 1 - Game Theory
Lecture 1 - Game TheoryLecture 1 - Game Theory
Lecture 1 - Game Theory
 
Game
Game Game
Game
 
Game theory project
Game theory projectGame theory project
Game theory project
 
Applications of game theory on event management
Applications of game theory on event management Applications of game theory on event management
Applications of game theory on event management
 
Introduction to Game Theory
Introduction to Game TheoryIntroduction to Game Theory
Introduction to Game Theory
 
Science of negotiation
Science of negotiationScience of negotiation
Science of negotiation
 
Game theory
Game theory Game theory
Game theory
 
Prisoner's Dilemma
Prisoner's DilemmaPrisoner's Dilemma
Prisoner's Dilemma
 
Dynamics
DynamicsDynamics
Dynamics
 
Exposé biad game-theory
Exposé biad game-theoryExposé biad game-theory
Exposé biad game-theory
 
Cognitive Bias in Risk-Reward Analysis
Cognitive Bias in Risk-Reward AnalysisCognitive Bias in Risk-Reward Analysis
Cognitive Bias in Risk-Reward Analysis
 
A brief introduction to the basics of game theory
A brief introduction to the basics of game theoryA brief introduction to the basics of game theory
A brief introduction to the basics of game theory
 
Game Theory - An Introduction (2009)
Game Theory - An Introduction (2009)Game Theory - An Introduction (2009)
Game Theory - An Introduction (2009)
 
GT Presentation
GT PresentationGT Presentation
GT Presentation
 

Viewers also liked

Boomtime: Risk as Economics (Allison Miller, SiRAcon15)
Boomtime: Risk as Economics (Allison Miller, SiRAcon15)Boomtime: Risk as Economics (Allison Miller, SiRAcon15)
Boomtime: Risk as Economics (Allison Miller, SiRAcon15)Allison Miller
 
2010.08 Applied Threat Modeling: Live (Hutton/Miller)
2010.08 Applied Threat Modeling: Live (Hutton/Miller)2010.08 Applied Threat Modeling: Live (Hutton/Miller)
2010.08 Applied Threat Modeling: Live (Hutton/Miller)Allison Miller
 
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...Allison Miller
 
8 Places to use Keywords on Your Website
8 Places to use Keywords on Your Website8 Places to use Keywords on Your Website
8 Places to use Keywords on Your WebsiteWired Flare
 
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltexRedbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltexWoltex.nl
 
Do you get alerts before your contracts expire
Do you get alerts before your contracts expireDo you get alerts before your contracts expire
Do you get alerts before your contracts expirePractice-League
 
9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket Socialista9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket SocialistaNayma Consultores
 
The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)Willy Marroquin (WillyDevNET)
 
Patterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and AfterPatterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and AfterCity of Dayton
 
Чат боты как пробный, коммуникационный, шар ии на пути иичу
Чат боты как пробный, коммуникационный, шар ии на пути иичуЧат боты как пробный, коммуникационный, шар ии на пути иичу
Чат боты как пробный, коммуникационный, шар ии на пути иичуSergey Skabelkin
 
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...AM Publications
 
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarınıIva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarınıIVA NATURA
 
NSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK LtdNSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK LtdGary Boys
 

Viewers also liked (16)

Boomtime: Risk as Economics (Allison Miller, SiRAcon15)
Boomtime: Risk as Economics (Allison Miller, SiRAcon15)Boomtime: Risk as Economics (Allison Miller, SiRAcon15)
Boomtime: Risk as Economics (Allison Miller, SiRAcon15)
 
2010.08 Applied Threat Modeling: Live (Hutton/Miller)
2010.08 Applied Threat Modeling: Live (Hutton/Miller)2010.08 Applied Threat Modeling: Live (Hutton/Miller)
2010.08 Applied Threat Modeling: Live (Hutton/Miller)
 
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
 
Smallbizhouston Company Ppt
Smallbizhouston Company PptSmallbizhouston Company Ppt
Smallbizhouston Company Ppt
 
8 Places to use Keywords on Your Website
8 Places to use Keywords on Your Website8 Places to use Keywords on Your Website
8 Places to use Keywords on Your Website
 
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltexRedbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
 
Do you get alerts before your contracts expire
Do you get alerts before your contracts expireDo you get alerts before your contracts expire
Do you get alerts before your contracts expire
 
9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket Socialista9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket Socialista
 
The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)
 
Patterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and AfterPatterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and After
 
Philanthropic Curve
Philanthropic CurvePhilanthropic Curve
Philanthropic Curve
 
Castañeda y ppk
Castañeda y ppkCastañeda y ppk
Castañeda y ppk
 
Чат боты как пробный, коммуникационный, шар ии на пути иичу
Чат боты как пробный, коммуникационный, шар ии на пути иичуЧат боты как пробный, коммуникационный, шар ии на пути иичу
Чат боты как пробный, коммуникационный, шар ии на пути иичу
 
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
 
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarınıIva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
 
NSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK LtdNSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
 

Similar to 2012.12 Games We Play: Defenses & Disincentives

Bec doms ppt on the economics of information and uncertainty
Bec doms ppt on the economics of information and uncertaintyBec doms ppt on the economics of information and uncertainty
Bec doms ppt on the economics of information and uncertaintyBabasab Patil
 
Game Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxGame Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxAnders Drachen
 
LAFS Game Mechanics - Information and Game Mechanics
LAFS Game Mechanics - Information and Game MechanicsLAFS Game Mechanics - Information and Game Mechanics
LAFS Game Mechanics - Information and Game MechanicsDavid Mullich
 
Game Theory Introduction
Game Theory IntroductionGame Theory Introduction
Game Theory IntroductionRobin Anderson
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
navingameppt-191018085333.pdf
navingameppt-191018085333.pdfnavingameppt-191018085333.pdf
navingameppt-191018085333.pdfDebadattaPanda4
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 
Mba Ebooks ! Edhole
Mba Ebooks ! EdholeMba Ebooks ! Edhole
Mba Ebooks ! EdholeEdhole.com
 
Security Issues in Massively Multiplayer Online Games
Security Issues in Massively Multiplayer Online GamesSecurity Issues in Massively Multiplayer Online Games
Security Issues in Massively Multiplayer Online GamesDebbieJiang
 
Trees Are Our Best Friend Essay In English
Trees Are Our Best Friend Essay In EnglishTrees Are Our Best Friend Essay In English
Trees Are Our Best Friend Essay In EnglishSharon Miller
 
LAFS Game Mechanics - Narrative Elements
LAFS Game Mechanics - Narrative ElementsLAFS Game Mechanics - Narrative Elements
LAFS Game Mechanics - Narrative ElementsDavid Mullich
 

Similar to 2012.12 Games We Play: Defenses & Disincentives (20)

gt_2007
gt_2007gt_2007
gt_2007
 
Bec doms ppt on the economics of information and uncertainty
Bec doms ppt on the economics of information and uncertaintyBec doms ppt on the economics of information and uncertainty
Bec doms ppt on the economics of information and uncertainty
 
Game Analytics: Opening the Black Box
Game Analytics: Opening the Black BoxGame Analytics: Opening the Black Box
Game Analytics: Opening the Black Box
 
Libratus
LibratusLibratus
Libratus
 
Writing a gaming proposal
Writing a gaming proposalWriting a gaming proposal
Writing a gaming proposal
 
LAFS Game Mechanics - Information and Game Mechanics
LAFS Game Mechanics - Information and Game MechanicsLAFS Game Mechanics - Information and Game Mechanics
LAFS Game Mechanics - Information and Game Mechanics
 
Lecture 2 Social Preferences I
Lecture 2 Social Preferences ILecture 2 Social Preferences I
Lecture 2 Social Preferences I
 
Something Wicked
Something WickedSomething Wicked
Something Wicked
 
Game Theory Introduction
Game Theory IntroductionGame Theory Introduction
Game Theory Introduction
 
Learning Through Gaming
Learning Through GamingLearning Through Gaming
Learning Through Gaming
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
navingameppt-191018085333.pdf
navingameppt-191018085333.pdfnavingameppt-191018085333.pdf
navingameppt-191018085333.pdf
 
James Gatto
James GattoJames Gatto
James Gatto
 
James Gatto
James GattoJames Gatto
James Gatto
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 
Mba Ebooks ! Edhole
Mba Ebooks ! EdholeMba Ebooks ! Edhole
Mba Ebooks ! Edhole
 
game THEORY ppt
game THEORY pptgame THEORY ppt
game THEORY ppt
 
Security Issues in Massively Multiplayer Online Games
Security Issues in Massively Multiplayer Online GamesSecurity Issues in Massively Multiplayer Online Games
Security Issues in Massively Multiplayer Online Games
 
Trees Are Our Best Friend Essay In English
Trees Are Our Best Friend Essay In EnglishTrees Are Our Best Friend Essay In English
Trees Are Our Best Friend Essay In English
 
LAFS Game Mechanics - Narrative Elements
LAFS Game Mechanics - Narrative ElementsLAFS Game Mechanics - Narrative Elements
LAFS Game Mechanics - Narrative Elements
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

2012.12 Games We Play: Defenses & Disincentives

  • 1. Games We Play Defenses and Disincentives Allison Miller
  • 2. Overview Overview of econ & game theory concepts Game theory games Infosec issues as games Designing games to win Walk-through a defense built on disincentives Wrap-up
  • 3. Economics applied to security Utility theory Externalities Information Asymmetries Signaling Marginal cost
  • 4. Game theory Branch of applied mathematics Studies decisions made by players interacting (or competing) - Scenarios have rules and pay-offs - Costs & benefits dependent on decisions of other players Used as a framework in economics, comp sci, biology, & philosophy - Also business, negotiation, and military strategy
  • 5. Discussing Games Mechanics of a payoff matrix Player 2 A B Player 1 A A1, A2 A1, B2 B B1, A2 B1, B2
  • 6. Discussing Games Mechanics of decision trees UP DOWN CIRCLE RED BLUE MARIO LUIGI KIRBY GIZMO 10, 3 2, 10 2, 5 -3, 3 A B B A A A
  • 7. Typical game theory "games" Chicken / Brinkmanship - Push it to the edge Volunteer’s Dilemma - For the greater good Tragedy of the Commons - Share and share alike (cumulative effect of cheating) Prisoner’s Dilemma
  • 8. Discussing Games Prisoner’s Dilemma Player 2 Keep quiet Confess Player 1 Keep quiet -1, -1 Mutual cooperation 0, -10 Individual defection Confess -10, 0 Individual defection -3, -3 Mutual punishment
  • 10. Nash Equilibrium Equilibrium is reached when: - Players in a game have selected a strategy - Neither side can change it’s strategy independently & improve position Optimal solution in games with limited outcomes
  • 11. Discussing Games Prisoner’s Dilemma Player 2 Keep quiet Confess Player 1 Keep quiet -1, -1 Mutual cooperation 0, -10 Individual defection Confess -10, 0 Individual defection -3, -3 Mutual punishment
  • 12. Setting up risk problems as games Identify players in the game Clarify the “rules” Show me your moves Describe payoffs Single move or repeated game
  • 13. Discussing Games Tragedy of the Commons: Spam, Bandwidth usage Everyone else’s choices > n choose wise usage Less than n choose wise usage Individual choice Use resource wisely Cost, but social benefit Mutual cooperation Cost (Subsidize social use) Overuse resource Social benefit (Benefit w/o cost) 0 Resources depleted
  • 14. Discussing Games Chicken/Brinkmanship: Vulnerability Disclosure Vulnerability Researcher Report Exploit Asset Owner Reward / Respond 0, 0 Responsible disclosure -2, +2 Early disclosure Ignore / Deny +2, -2 Defer vulnerability -10, -10 0-day go boom
  • 15. Discussing Games Volunteer’s Dilemma: Data breach cost info sharing All other victims At least one shares All keep quiet Victim Share 0 0 Cost, limited benefit Keep quiet 1 Benefit w/o cost -10 Everyone’s in the dark
  • 16. How games are won Clarify dominant strategies Find equilibrium Pursue equilibrium or change the payoffs
  • 17. Moves Current game-play - Controls are layered or chained until we're satisfied that for some set of attackers, the cost of the attack is higher than the utility associated with their payoff Reputation requirements for participation Role requirements for participation (access control) Incremental authentication Content/context based filtering Blacklisting / whitelisting Rate limiting Bot limiters (Captcha) Obfuscation/Encryption
  • 18. Counter-moves For every move there is a counter-move
  • 19. Putting the pieces on the board The amount of friction inserted into the system depends on: - Value of asset to the owner - Value of the asset to potential attackers - Number of attackers expected - Portion of attacks that must be averted - Disincentive value of each layer of friction for an attacker Now it’s time to play our game
  • 20. Does this sound familiar?
  • 21. Managing Decisions Game Theory is a framework for studying decisions - Since payoffs depends on the choices of other players, moves are risky - Players play based on their risk appetite - Risk management = decision management Defenders design control systems that make decisions - Where risks manifest in observable behavior - That make moves/counter-moves depending on the context and understanding of an actor’s identity or intent - Where system or individual costs/payoffs depend on the outcome of an actor’s actions
  • 22. SHALL WE PLAY A GAME? (SINCE WE CAN’T PLAY “CLUE” FOR EVERY LOGIN TRANSACTION NEW USER MESSAGE FRIEND REQUEST ATTACHMENT PACKET WINK POKE CLICK WE BUILD RISK MODELS)
  • 23. Applying Decisions Risk management is decision management ACTOR ATTEMPTS ACTION SUBMIT WHAT IS THE REQUEST HOW TO HONOR THE REQUEST SHOULD WE HONOR? RESULT ACTION OCCURS
  • 24. Not all risk decisions have a competitive element, but all competition / games have risks
  • 25. Create account using fake identity Script completion of verifications Outsource captcha Create accounts across virtual devices Distribute creation of accts using botnet Scrape identities from public sites Age accounts, then reactivate Use stolen credentials Defraud verification process ... Require email verification Test for human behind keyboard Rate limit by device ID Rate limit by IP/location Look for similarities across accounts Require reputation level to proceed Filter for content / context, add auth challenge Require manual verification Manual review of account/event ...
  • 26. Except one small thing... ...what kind of game is this?
  • 27. Multi-player Mode Offense Attempt Success Defense Deflect 4, 4 0, 10 Ignore 10, 0 1, 1 Offense Attempt Success Defense Deflect 4, 4 0, 10 Ignore 10, 0 1, 1 Offense Attempt Success Defense Deflect 4, 4 0, 10 Ignore 10, 0 1, 1 Offense Attempt Success Defense Deflect 4, 4 0, 10 Ignore 10, 0 1, 1 Attackers are not the only players in the game Legitimate users that are also affected by added friction
  • 28. Team Dynamics So this adds another factor into the appropriate level of friction question, which is: - Disincentive value of each layer of friction for an innocent - Likelihood the disincentive will be incorrectly applied to an innocent - Likelihood the disincentive value > payoff value for the innocent (go find a new game)
  • 29. Decisions, Decisions Authorize Block Good false positive Bad false negative RESPONSE POPULATION Incorrect decisions have a cost Correct decisions are free (usually) Good Action Gets Blocked Bad Action Gets Through Downstream Impacts
  • 31. Why are we still playing? Economic/mathematical models depend on rational participants Free will doesn’t imply rationality Economics studies what should happen, behavioral economics studies what does happen
  • 32. Example of rational irrationality Ultimatum Game - Player A given $1000 Player A needs to split the $ with Player B Player A gets to choose the split - Player B receives offer If B accepts, both get $ If B rejects, both get 0
  • 33. Take it or leave it Outcomes - Player A’s usually offer ~50% - Player B’s often reject if offered <30% - This behavior occurs across cultures, levels of wealth Emotions matter - Heightened brain activity in Bilateral antierior insula (disgust) w/low offers Dorsolateral prefrontal cortext (cognitive decision making) w/high offers - Fairness, Fear, Punishing the mean
  • 34. Therefore: Winning strategies depend on understanding behavior Both attackers and defenders may exhibit bias when making decisions - about the game and other players Retrofit conceptual models to actual experiences Fill in the blanks on player costs/payoffs Risk controls still either need to - Change friction (cost), or - Change expected value of pay-off Continue to analyze game dynamics over time - Low-risk, high frequency interactions (data) - High-risk, low frequency interactions (negotiation)
  • 35. Prediction is very difficult, especially about the future Niels Bohr Allison Miller @selenakyle
  • 36. Some references Axelrod, Robert. The Evolution of Cooperation. Dixit, Avinash and Nalebuff, Barry. The Art of Strategy: A Game Theorist’s Guide to Success in Business and in Life. Fisher, Len. Rock, Paper, Scissors: Game Theory in Everyday Life. Gibbons, Robert. Game Theory for Applied Economists. Meadows, Donella. Thinking in Systems: A Primer. Wikipedia’s sections on Game Theory, Economics, & Probability.