首页> 外文会议>International conference on decision and game theory for security >Games of Timing for Security in Dynamic Environments
【24h】

Games of Timing for Security in Dynamic Environments

机译:动态环境中的安全定时游戏

获取原文

摘要

Increasing concern about insider threats, cyber-espionage, and other types of attacks which involve a high degree of stealthiness has renewed the desire to better understand the timing of actions to audit, clean, or otherwise mitigate such attacks. However, to the best of our knowledge, the modern literature on games shares a common limitation: the assumption that the cost and effectiveness of the players' actions are time-independent. In practice, however, the cost and success probability of attacks typically vary with time, and adversaries may only attack when an opportunity is present (e.g., when a vulnerability has been discovered). In this paper, we propose and study a model which captures dynamic environments. More specifically, we study the problem faced by a defender who has deployed a new service or resource, which must be protected against cyber-attacks. We assume that adversaries discover vulnerabilities according to a given vulnerability-discovery process which is modeled as an arbitrary function of time. Attackers and defenders know that each found vulnerability has a basic lifetime, i.e., the likelihood that a vulnerability is still exploitable at a later date is subject to the efforts by ethical hackers who may rediscover the vulnerability and render it useless for attackers. At the same time, the defender may invest in mitigation efforts to lower the impact of an exploited vulnerability. Attackers therefore face the dilemma to either exploit a vulnerability immediately, or wait for the defender to let its guard down. The latter choice leaves the risk to come away empty-handed. We develop two versions of our model, i.e., a continuous-time and a discrete-time model, and conduct an analytic and numeric analysis to take first steps towards actionable guidelines for sound security investments in dynamic contested environments.
机译:对内部威胁,网络间谍活动以及涉及高度隐身性的其他类型攻击的关注日益增加,这重新激发了人们对更好地了解审计,清除或缓解此类攻击的时机的渴望。然而,就我们所知,关于游戏的现代文献有一个共同的局限性:假设玩家行为的成本和有效性与时间无关。然而,实际上,攻击的成本和成功概率通常随时间而变化,并且攻击者只能在存在机会时(例如,在发现漏洞时)进行攻击。在本文中,我们提出并研究了捕获动态环境的模型。更具体地说,我们研究部署新服务或资源的防御者所面临的问题,必须保护其免受网络攻击。我们假设对手根据给定的漏洞发现过程发现漏洞,该过程被建模为时间的任意函数。攻击者和防御者知道,每个发现的漏洞都有一个基本生存期,即,某个漏洞在以后仍可被利用的可能性受到道德黑客的努力的影响,道德黑客可能会重新发现该漏洞,并使其对攻击者毫无用处。同时,防御者可以投资于缓解措施,以降低被利用漏洞的影响。因此,攻击者面临的困境是要么立即利用漏洞,要么等待防御者放松警惕。后一种选择会留下空手而归的风险。我们开发了两个版本的模型,即连续时间模型和离散时间模型,并进行了分析和数值分析,以迈出第一步,朝着在动态竞争环境中进行可靠安全投资的可行指导方针迈出了第一步。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号