Skip to main content
Log in

Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

We present a game theoretic framework that models strategic interactions among humans and things that are assumed to be interconnected by a social-technological network, as in an internet of humans and things (IOHT). Often a pair of agents in the network interacts in order for an informed sender-agent to signal an uninformed receiver-agent to take an action that benefits each of the players; the benefits to the pair of agents are modeled by two separate utility functions, both depending on the sender’s private information, the signal exchanged, and the receiver’s revealed (and also possibly unrevealed) action. In general, the two agents’ utilities may not be aligned and may encourage deceptive behavior. For example, a sender, aware of his/her own private “state of ignorance”, may seek useful information from a receiver who owns powerful computational resources to search a large corpus of webpages; the sender does so by sending a signal to the receiver in the form of a keyword. Obvious examples of deceptiveness here range from attempts to hide one’s intentions to auctioning the keywords on an ad exchange through real-time bidding. A rather troublesome situation occurs when deceptions are employed to breach the security of the system, thus making the entire social-technological network unreliable. Earlier, we proposed a signaling-game-theoretic framework to alleviate this problem. This paper further enhances that framework by reconfiguring signals to possess more complex structures (epistatic signals to represent attack and defense options over a given set of vulnerabilities). We explore two augmentations to the original evolutionary signaling game by first enhancing mutation bias toward strategies performing well in previous populations and second allowing the parameters of the utility functions to depend on population preferences giving rise to a minority game with epistatic signaling. The resulting game systems are empirically studied through extensive computer simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. Vulnerabilities may be considered code objects which can be exploited and attacked by a malicious user.

  2. Vulnerabilities may result from technical deficits such as sloppy code writing, thus leaving a user exposed to an attacker.

References

  1. Arthur WB (1994) Inductive reasoning and bounded rationality. Am Econ Rev 406–411

  2. van den Berg HA (2009) Design principles of adaptive cellular immunity for artificial immune systems. Soft Comput 13(11):1073–1080. http://dblp.uni-trier.de/db/journals/soco/soco13.html#Berg09

    Article  Google Scholar 

  3. Binmore KG, Samuelson L (1992) Evolutionary stability in repeated games played by finite automata. J Econ Theory 278– 305

  4. Casey W, Wright E, Morales JA, Appel M, Gennari J, Mishra B (2014) Agent-based trace learnng in a recommendation-verification system for cybersecurity. In: 9th IEEE international conference on malicious and unwanted software, MALCON

  5. Casey W, Morales JA, Nguyen T, Spring J, Weaver R, Wright E, Metcalf L, Mishra B (2014) Cyber security via signaling games: toward a science of cyber security. In: ICDCIT, pp 34– 42

  6. Cho IK, Kreps DM (1987) Signaling games and stable equilibria. Q J Econ 179–221

  7. Kassner M (2013) Android flashlight app tracks users via GPS, FTC says hold on., http://www.techrepublic.com/blog/it-security/why-does-an-android-flashlight-app-need-gps-permission/, [Online; posted December 11, 2013, 9:49 PM PST]

  8. van Veelen M, García J, Rand DG, Nowak MA (2012) Direct reciprocity in structured populations. Proc Natl Acad Sci 109(25):9929–9934. doi:10.1073/pnas.1206694109

    Article  Google Scholar 

Download references

Acknowledgments

This work is funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. We wish also to thank Leigh Metcalf, Thomson Nguyen, and Jonathan Spring for engaging discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William Casey.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Casey, W., Weaver, R., Morales, J.A. et al. Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems. Mobile Netw Appl 21, 161–174 (2016). https://doi.org/10.1007/s11036-016-0705-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-016-0705-9

Keywords

Navigation