Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach

被引:1
|
作者
Qin, Yang [1 ]
Yang, Xiaofan [1 ]
Yang, Lu-Xing [2 ]
Huang, Kaifan [1 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400044, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
基金
中国国家自然科学基金;
关键词
Advanced persistent threat; APT defense outsourcing; Single-impulsive defense problem; Single-impulsive differential game; Nash equilibrium; STRATEGIC TRUST; SYSTEMS; FLIPIT;
D O I
10.1016/j.cose.2024.104003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) poses serious threat to organizations with rich digital assets. APT detection programs designed for quickly finding possibly hijacked hosts are now commercially available. This greatly reduces the workload of APT defense. In practice, the identification and repair of APT-hijacked hosts are out of a system administrator's capability and have to be outsourced to an established cybersecurity firm. Owing to the limited security budget, the APT defense can be outsourced only in a small number of maintenance periods. We refer to the sequence of outsourcing costs paid in these maintenance periods as an impulsive defense (ID) strategy. On the other hand, APT is time-continuous. We refer to the growth rate function of the attack cost over time as a continuous attack (CA) strategy. In the context that the APT actor is strategic and pursues a cost-effective CA strategy, the organization faces the problem of finding a cost-effective ID strategy (the single-impulsive defense (SID) problem). This paper addresses the SID problem through game-theoretic modeling. Based on an impulsive state evolutionary model, the SID problem is boiled down to a single- impulsive differential game model (the SID model). By applying single-impulsive differential game theory, an iterative algorithm of solving the SID problem is presented. The ID strategy obtained by running the algorithm is corroborated to be cost-effective under the Nash equilibrium solution concept. Therefore, we recommend the ID strategy. This work takes the first step toward the theoretic study of APT defense outsourcing in the presence of strategic attacker.
引用
收藏
页数:11
相关论文
共 24 条
  • [1] Impulsive Artificial Defense Against Advanced Persistent Threat
    Sun, Hao
    Yang, Xiaofan
    Yang, Lu-Xing
    Huang, Kaifan
    Li, Gang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3506 - 3516
  • [2] Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach
    Yang, Lu-Xing
    Li, Pengdeng
    Zhang, Yushu
    Yang, Xiaofan
    Xiang, Yong
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) : 1713 - 1728
  • [3] Defense Against Advanced Persistent Threat Through Data Backup and Recovery
    Yang, Lu-Xing
    Huang, Kaifan
    Yang, Xiaofan
    Zhang, Yushu
    Xiang, Yong
    Tang, Yuan Yan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2001 - 2013
  • [4] Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [5] Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
    Hu, Pengfei
    Li, Hongxing
    Fu, Hao
    Cansever, Derya
    Mohapatra, Prasant
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [6] Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4250 - 4261
  • [7] A Study on Security Framework Against Advanced Persistent Threat
    Zhang, Qingyun
    Li, Huan
    Hu, Jinsong
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 128 - 131
  • [8] Dynamic defense strategy against advanced persistent threat under heterogeneous networks
    Lv, Kun
    Chen, Yun
    Hu, Changzhen
    INFORMATION FUSION, 2019, 49 : 216 - 226
  • [9] A Risk Management Approach to Defending Against the Advanced Persistent Threat
    Yang, Lu-Xing
    Li, Pengdeng
    Yang, Xiaofan
    Tang, Yuan Yan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1163 - 1172
  • [10] Cumulative Prospect Theoretic Study of A Cloud Storage Defense Game Against Advanced Persistent Threats
    Xu, Dongjin
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 541 - 546