Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Branislav Bošanský is active.

Publication


Featured researches published by Branislav Bošanský.


decision and game theory for security | 2012

Game Theoretic Model of Strategic Honeypot Selection in Computer Networks

Radek Píbil; Viliam Lisý; Christopher Kiekintveld; Branislav Bošanský; Michal Pěchouček

A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. Based on formal deception games, we develop two game-theoretic models that provide insight into how valuable should honeypots look like to maximize the probability that a rational attacker will attack a honeypot. The first model captures a static situation and the second allows attackers to imperfectly probe some of the systems on the network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We formally analyze the properties of the optimal strategies in the games and provide linear programs for their computation. Finally, we present the optimal solutions for a set of instances of the games and evaluate their quality in comparison to several baselines.


european conference on artificial intelligence | 2012

Game-theoretic approach to adversarial plan recognition

Viliam Lisý; Radek Píbil; Jan Stiborek; Branislav Bošanský; Michal Pěchouček

We argue that the problem of adversarial plan recognition, where the observed agent actively tries to avoid detection, should be modeled in the game theoretic framework. We define the problem as an imperfect-information extensive-form game between the observer and the observed agent. We propose a novel algorithm that approximates the optimal solution in the game using Monte-Carlo sampling. The experimental evaluation is performed on a synthetic domain inspired by a network security problem. The proposed method produces significantly better results than several simple baselines on a practically large domain.


decision and game theory for security | 2015

Approximate solutions for attack graph games with imperfect information

Karel Durkota; Viliam Lisý; Branislav Bošanský; Christopher Kiekintveld

We study the problem of network security hardening, in which a network administrator decides what security measures to use to best improve the security of the network. Specifically, we focus on deploying decoy services or hosts called honeypots. We model the problem as a general-sum extensive-form game with imperfect information and seek a solution in the form of Stackelberg Equilibrium. The defender seeks the optimal randomized honeypot deployment in a specific computer network, while the attacker chooses the best response as a contingency attack policy from a library of possible attacks compactly represented by attack graphs. Computing an exact Stackelberg Equilibrium using standard mixed-integer linear programming has a limited scalability in this game. We propose a set of approximate solution methods and analyze the trade-off between the computation time and the quality of the strategies calculated.


european conference on artificial intelligence | 2014

Practical performance of refinements of Nash equilibria in extensive-form zero-sum games

Jiří Čermák; Branislav Bošanský; Viliam Lisý

Nash equilibrium (NE) is the best known solution concept used in game theory. It is known that NE is particularly weak even in zero-sum extensive-form games since it can prescribe irrational actions to play that do not exploit mistakes made by an imperfect opponent. These issues are addressed by a number of refinements of NE that strengthen the requirements for equilibrium strategies. However, a thorough experimental analysis of practical performance of the Nash equilibria refinement strategies is, to the best of our knowledge, missing. This paper aims to fill this void and provides the first broader experimental comparison of the quality of refined Nash strategies in zero-sum extensive-form games. The experimental results suggest that (1) there is a significant difference between the best and the worst NE strategy against imperfect opponents, (2) the existing refinements outperform the worst NE strategy, (3) they typically perform close to the best possible NE strategy, and (4) the difference in performance of all compared refinements is very small.


european conference on artificial intelligence | 2012

Iterative algorithm for solving two-player zero-sum extensive-form games with imperfect information

Branislav Bošanský; Christopher Kiekintveld; Viliam Lisý; Michal Pěchouček

We develop and evaluate a new exact algorithm for finding Nash equilibria of two-player zero-sum extensive-form games with imperfect information. Our approach is based on the sequence-form representation of the game, and uses an algorithmic framework of double-oracle methods that have been used successfully in other classes of games. The algorithm uses an iterative decomposition, solving restricted games and exploiting fast best-response algorithms to add additional sequences to the game over time. We demonstrate our algorithm on a class of adversarial graph search games motivated by real world border patrolling scenarios. The results indicate that our framework is a promising way to scale up solutions for extensive-form games, reducing both memory and computation time requirements.


Artificial Intelligence | 2016

Algorithms for computing strategies in two-player simultaneous move games

Branislav Bošanský; Viliam Lisý; Marc Lanctot; Jiří Čermák; Mark H. M. Winands

Abstract Simultaneous move games model discrete, multistage interactions where at each stage players simultaneously choose their actions. At each stage, a player does not know what action the other player will take, but otherwise knows the full state of the game. This formalism has been used to express games in general game playing and can also model many discrete approximations of real-world scenarios. In this paper, we describe both novel and existing algorithms that compute strategies for the class of two-player zero-sum simultaneous move games. The algorithms include exact backward induction methods with efficient pruning, as well as Monte Carlo sampling algorithms. We evaluate the algorithms in two different settings: the offline case, where computational resources are abundant and closely approximating the optimal strategy is a priority, and the online search case, where computational resources are limited and acting quickly is necessary. We perform a thorough experimental evaluation on six substantially different games for both settings. For the exact algorithms, the results show that our pruning techniques for backward induction dramatically improve the computation time required by the previous exact algorithms. For the sampling algorithms, the results provide unique insights into their performance and identify favorable settings and domains for different sampling algorithms.


decision and game theory for security | 2017

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers

Karel Durkota; Viliam Lisý; Christopher Kiekintveld; Karel Horák; Branislav Bošanský; Tomáš Pevný

We study the problem of detecting data exfiltration in computer networks. We focus on the performance of optimal defense strategies with respect to an attacker’s knowledge about typical network behavior and his ability to influence the standard traffic. Internal attackers know the typical upload behavior of the compromised host and may be able to discontinue standard uploads in favor of the exfiltration. External attackers do not immediately know the behavior of the compromised host, but they can learn it from observations.


decision and game theory for security | 2017

Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security

Karel Horák; Quanyan Zhu; Branislav Bošanský

Due to the sophisticated nature of current computer systems, traditional defense measures, such as firewalls, malware scanners, and intrusion detection/prevention systems, have been found inadequate. These technological systems suffer from the fact that a sophisticated attacker can study them, identify their weaknesses and thus get an advantage over the defender. To prevent this from happening a proactive cyber defense is a new defense mechanism in which we strategically engage the attacker by using cyber deception techniques, and we influence his actions by creating and reinforcing his view of the computer system. We apply the cyber deception techniques in the field of network security and study the impact of the deception on attacker’s beliefs using the quantitative framework of the game theory. We account for the sequential nature of an attack and investigate how attacker’s belief evolves and influences his actions. We show how the defender should manipulate this belief to prevent the attacker from achieving his goals and thus minimize the damage inflicted to the network. To design a successful defense based on cyber deception, it is crucial to employ strategic thinking and account explicitly for attacker’s belief that he is being exposed to deceptive attempts. By doing so, we can make the deception more believable from the perspective of the attacker.


International Journal of Approximate Reasoning | 2018

Approximating maxmin strategies in imperfect recall games using A-loss recall property

Jiří Čermák; Branislav Bošanský; Karel Horák; Viliam Lisý; Michal Pěchouček

Abstract Extensive-form games with imperfect recall are an important model of dynamic games where the players are allowed to forget previously known information. Often, imperfect recall games result from an abstraction algorithm that simplifies a large game with perfect recall. Solving imperfect recall games is known to be a hard problem, and thus it is useful to search for a subclass of imperfect recall games which offers sufficient memory savings while being efficiently solvable. The abstraction process can then be guided to result in a game from this class. We focus on a subclass of imperfect recall games called A-loss recall games. First, we provide a complete picture of the complexity of solving imperfect recall and A-loss recall games. We show that the A-loss recall property allows us to compute a best response in polynomial time (computing a best response is NP -hard in imperfect recall games). This allows us to create a practical algorithm for approximating maxmin strategies in two-player games where the maximizing player has imperfect recall and the minimizing player has A-loss recall. This algorithm is capable of solving some games with up to 5 ⋅ 10 9 states in approximately 1 hour. Finally, we demonstrate that the use of imperfect recall abstraction can reduce the size of the strategy representation to as low as 0.03 % of the size of the strategy representation in the original perfect recall game without sacrificing the quality of the maxmin strategy obtained by solving this abstraction.


international joint conference on artificial intelligence | 2017

Comparing Strategic Secrecy and Stackelberg Commitment in Security Games.

Qingyu Guo; Bo An; Branislav Bošanský; Christopher Kiekintveld

The Strong Stackelberg Equilibrium (SSE) has drawn extensive attention recently in several security domains. However, the SSE concept neglects the advantage of defender’s strategic revelation of her private information, and overestimates the observation ability of the adversaries. In this paper, we overcome these restrictions and analyze the tradeoff between strategic secrecy and commitment in security games. We propose a Disguised-resource Security Game (DSG) where the defender strategically disguises some of her resources. We compare strategic information revelation with public commitment and formally show that they have different advantages depending the payoff structure. To compute the Perfect Bayesian Equilibrium (PBE), several novel approaches are provided, including a novel algorithm based on support set enumeration, and an approximation algorithm for -PBE. Extensive experimental evaluation shows that both strategic secrecy and Stackelberg commitment are critical measures in security domain, and our approaches can efficiently solve PBEs for realistic-sized problems.

Collaboration


Dive into the Branislav Bošanský's collaboration.

Top Co-Authors

Avatar

Viliam Lisý

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Michal Pěchouček

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Jiří Čermák

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Karel Horák

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Christopher Kiekintveld

University of Texas at El Paso

View shared research outputs
Top Co-Authors

Avatar

Michal Jakob

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Jiri Cermak

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Michal Pechoucek

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Karel Durkota

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Ondřej Vaněk

Czech Technical University in Prague

View shared research outputs
Researchain Logo
Decentralizing Knowledge