A Survival Game Analysis to Common Personal Identity Protection Strategies

Member for

4 years 8 months
Full name
Ryan Anderson
Abstract
Show Abstract

Throughout the years, authentication processes of individ-uals’ identities have become essential parts of our modern daily life. These authentication processes also introduced the heavy use of Per-sonally Identifiable Information (PII) in various applications. On the other hand, the continuous increase of identity–the unauthorized use of such PII–has created rich business opportunities for identity protection service providers. These services usually consist of a monitoring system that continuously searches through the Internet for incidents that sup-posedly indicates identity theft activities. However, these solutions are largely based on case studies and a quantified method is missing among different identity protection services.
This research offers a tool that provides quantitative analysis among dif-ferent identity protection services. By bringing together previous work in the field, namely the UT Center for Identity (CID) Identity Ecosystem (a Bayesian network mathematical representation of a person’s identity), real world identity theft data, stochastic game theory, and Markov deci-sion processes, we generate and evaluate the best strategy for defending against the theft of personal identity information. One of the research problems that this paper addresses is the computation complexity of quantitatively evaluating identity protection strategies with real world data. In a real world database like Identity Threat Assessment and Pre-diction (ITAP) project which the UT CID Identity Ecosystem is built on, the number of PII attributes in use are normally in the order of 103. We propose a reinforcement learning algorithm for solving the optimal strategy to protect the user’s identity against a malicious and efficient at-tacker. We aim to understand how initial individual PII exposure evolves into crucial PII breaches over time in terms of the dynamic integrity of the Identity Ecosystem. Real world identity protection strategies are then translated into the system and fight against the malicious attacker for quantitative comparison in our experiment. We present the survival analysis to these strategies and calculate the survival gap between these strategies against our active protection strategy as our experiment result. This study is aimed to understand the evolutionary process of identity under attack which may inspire a new direction for future identity pro-tection strategies.

 

Access Publication: Download PDF of Report

Downloads
/sites/default/files/2020-10/A%20Survival%20Game%20Analysis%20to%20Common%20Personal%20Identity%20Protection%20Strategies.pdf
Display Title

A Survival Game Analysis to Common Personal Identity Protection Strategies
D. Liau, R. Nokhbeh Zaeem, and K. Suzanne Barber. UT CID Report#: 20-12, June 2020.