首页> 外文期刊>Computers & Security >Hardening networks against strategic attackers using attack graph games
【24h】

Hardening networks against strategic attackers using attack graph games

机译:使用攻击图游戏强化针对战略攻击者的网络

获取原文
获取原文并翻译 | 示例
           

摘要

We consider the problem faced by a network administrator (defender) when deploying limited security resources to protect a network against a strategic attacker. To evaluate the effectiveness of a defense strategy, one must consider possible counterattacks that an attacker can choose. We use game theory to model the interaction between the defender and the attacker. Game theory provides relevant concepts and algorithms for computing optimal strategies in environments with multiple decision makers. To model the space of attacker's possible actions, we use attack graphs, that compactly represent all known sequences of attacker's action that may lead to successful attack for a given network. We demonstrate our approach on a specific type of defense actions, where the defender deploys deceptive hosts and services (honeypots) to detect and mitigate attacks.We assume the worst-case attacker who has a complete knowledge of the (typically randomized) defense strategy. We seek the optimal defense strategy against this attacker in the form of a Stackelberg equilibrium. Computing this solution exactly using standard techniques has limited scalability, so we investigate several approaches for increasing scalability to realistic problems. We introduce optimization methods for finding exact solutions for these games and then propose a variety of polynomial heuristic algorithms that scale to significantly larger games. We analyze the scalability and the quality of these heuristic solutions on realistic network topologies. We show that the strategies found by the heuristics are often near-optimal and that they outperform non-game-theoretic baselines. Finally, we show how attack graph games can be used to answer various research questions relevant to network security administrators. (C) 2019 Elsevier Ltd. All rights reserved.
机译:当部署有限的安全资源以保护网络免受战略攻击者攻击时,我们考虑网络管理员(防御者)面临的问题。要评估防御策略的有效性,必须考虑攻击者可以选择的可能的反击。我们使用博弈论来建模防御者与攻击者之间的交互。博弈论为在具有多个决策者的环境中计算最佳策略提供了相关的概念和算法。为了模拟攻击者可能采取的行动的空间,我们使用攻击图,该图紧凑地表示了所有已知的攻击者采取的行动序列,这些序列可能导致对给定网络的成功攻击。我们展示了针对特定类型防御措施的方法,其中防御者部署了欺骗性主机和服务(蜜罐)以检测和缓解攻击。我们假设最坏情况的攻击者完全了解(通常是随机的)防御策略。我们以Stackelberg均衡的形式寻求针对此攻击者的最佳防御策略。完全使用标准技术来计算此解决方案的可扩展性有限,因此,我们研究了几种增加可扩展性以解决实际问题的方法。我们介绍了用于为这些游戏找到精确解决方案的优化方法,然后提出了可扩展到明显更大的游戏的多种多项式启发式算法。我们在现实的网络拓扑上分析这些启发式解决方案的可伸缩性和质量。我们证明了启发式方法发现的策略通常是接近最优的,并且它们的性能优于非博弈论的基准。最后,我们展示了攻击图游戏如何用于回答与网络安全管理员有关的各种研究问题。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号