We analyze a binary hypothesis testing problem in which a defender has to decide whether or not a test sequence has been drawn from a given source P0 whereas, an attacker strives to impede the correct detection. In contrast to previous works, the adversarial setup addressed in this paper considers a fully active attacker, i.e. the attacker is active under both hypotheses. Specifically, the goal of the attacker is to distort the given sequence, no matter whether it has emerged from P0 or not, to confuse the defender and induce a wrong decision. We formulate the defender-attacker interaction as a game and study two versions of the game, corresponding to two different setups: a Neyman-Pearson setup and a Bayesian one. By focusing on asymptotic versions of the games, we show that there exists an attacking strategy that is both dominant (i.e., optimal no matter what the defense strategy is) and universal (i.e., independent of the underlying sources) and we derive equilibrium strategies for both parties.

Tondi, B., Barni, M., Merhav, N. (2015). Detection Games with a Fully Active Attacker. In 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. New York : IEEE [10.1109/WIFS.2015.7368575].

Detection Games with a Fully Active Attacker

Tondi, B.;Barni, M.;
2015-01-01

Abstract

We analyze a binary hypothesis testing problem in which a defender has to decide whether or not a test sequence has been drawn from a given source P0 whereas, an attacker strives to impede the correct detection. In contrast to previous works, the adversarial setup addressed in this paper considers a fully active attacker, i.e. the attacker is active under both hypotheses. Specifically, the goal of the attacker is to distort the given sequence, no matter whether it has emerged from P0 or not, to confuse the defender and induce a wrong decision. We formulate the defender-attacker interaction as a game and study two versions of the game, corresponding to two different setups: a Neyman-Pearson setup and a Bayesian one. By focusing on asymptotic versions of the games, we show that there exists an attacking strategy that is both dominant (i.e., optimal no matter what the defense strategy is) and universal (i.e., independent of the underlying sources) and we derive equilibrium strategies for both parties.
2015
978-146736802-5
978-1-4673-6801-8
Tondi, B., Barni, M., Merhav, N. (2015). Detection Games with a Fully Active Attacker. In 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. New York : IEEE [10.1109/WIFS.2015.7368575].
File in questo prodotto:
File Dimensione Formato  
07368575.pdf

non disponibili

Tipologia: PDF editoriale
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 801.75 kB
Formato Adobe PDF
801.75 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/981858