Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014.

Similar presentations


Presentation on theme: "A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014."— Presentation transcript:

1 A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014

2 1 Overview -Introduction -RecDroid system -Game theoretic model -Nash equilibrium -Discussion -Conclusion

3 2 RecDroid system -What is RecDroid? -A framework, to improve and assist mobile (smartphone) users to control their resource and privacy through crowd sourcing. -Android OS permission granting All-or-Nothing -Two app installation modes: -Probation -Trusted -Real-time resource granting decisions -Expert and peer recommendation system

4 3 RecDroid system (cont.) -RecDroid UI Installation ProcessRecommendation

5 4 RecDroid system (cont.) -RecDroid Functionalities: 1.Collecting permission-request responses 2.Analyzing the responses 3.Recommend low-risk responses to permission requests 4.Expanding expert user base 5.Ranking the apps

6 5 RecDroid system (cont.) -RecDroid’s Components  Verification system  Environment Knowledge  Expert users  Users  Malicious  Regular

7 6 RecDroid system (cont.) -Verification system  Environment knowledge  Previous responses  User behavior  App developer  Game model  Users’ type prediction  Security improvement

8 7 Game Theoretic Model -Normal- Form Representation  2 Players  Users (Malicious, Regular)  RecDroid system  Strategies space  Users  Malicious (Malicious, Not Malicious)  Regular (Not malicious)  RecDroid (Verify, Not verify)

9 8 Game Theoretic Model (cont.) -Normal- Form Representation  Payoff  Common parameters  Special parameters - Security value - Equal to gain/loss (both of them) -Loss of reputation (RecDroid) -Loss of secrecy (Malicious users) Cost of verification (RecDroid) Cost of responding (Maliciously) Recognition rate (true positive) of the RecDroid False alarm rate (false positive rate)

10 9 Game Theoretic Model (cont.) -Payoff matrix  Player i is malicious  Player i is regular

11 10 Game Theoretic Model (cont.) -Extensive form

12 11 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  (Malicious (malicious user), Not malicious (regular user)) (Malicious, Verify), Not BNE if(Malicious, Verify) (Malicious, Not Verify), Pure strategy BNE

13 12 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  (Not Malicious (malicious user), Not malicious (regular user))

14 13 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  We analyzed all the existing strategy combinations  No pure-strategy when  Mixed-strategy

15 14 Game Theoretic Model (cont.) -Bayesian Nash equilibrium  Mixed-strategy p : user plays Malicious q : RecDroid plays Verify

16 15 Discussion p is high, RecDroid has a high outcome p is low, User has a high outcome

17 16 Conclusion

18 Thank you !!! Question?


Download ppt "A Game-Theoretic Model for Defending Against Malicious Users in RecDroid Bahman Rashidi December 5 th, 2014."

Similar presentations


Ads by Google