A generic approach for network defense strategies generation based on evolutionary game theory

被引:2
作者
Liu, Liang [1 ]
Tang, Chuhao [1 ]
Zhang, Lei [1 ]
Liao, Shan [2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] 30th Res Inst China Elect Technol Grp Corp, Chengdu 610041, Peoples R China
关键词
Evolutionary game theory; Dynamic attack and defense; Optimal defense strategy; Attack graph; Active directory security;
D O I
10.1016/j.ins.2024.120875
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The generation of optimal defense strategies in dynamic adversarial environments is crucial for cybersecurity. Recently, defense approaches based on evolutionary game theory have gained significant achievements. However, they would fail when facing complex networks and sophisticated attack strategies, due to the fatal drawbacks of defense strategy generation considering atomic attacks only. To relieve this issue, a generic approach for generating defense strategies using evolutionary game theory is proposed in this paper. Initially, a novel payoff quantification method for network attack -defense games based on attack graphs is designed. Innovatively, two factors concerning the decision-maker's degree of irrationality (DI) and the level of environmental security (LES) are introduced into the replicator dynamics equation to model the impacts on equilibrium solutions. Noting that Active Directory (AD) domain service is one of the most used and representative information security management system in Windows domains, from which attack graphs and paths can be plainly extracted and analyzed. Therefore, it is necessary and imperative to anchor AD to unfold the theoretical analyses and experiments validation based on a real environment. Case studies on a real -world AD network demonstrate that the proposed approach is effective and can generate stable and efficient defense strategies.
引用
收藏
页数:26
相关论文
共 43 条
  • [1] Logit choice models for interactive attributes
    Aggarwal, Manish
    [J]. INFORMATION SCIENCES, 2020, 507 : 298 - 312
  • [2] Cascetta E, 2009, SPRINGER SER OPTIM A, V29, P89, DOI 10.1007/978-0-387-75857-2_3
  • [3] Dunagan J, 2009, SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P305
  • [4] Evolutionary game theory in a cell: A membrane computing approach
    Garcia-Victoria, Pedro
    Cavaliere, Matteo
    Gutierrez-Naranjo, Miguel A.
    Cardenas-Montes, Miguel
    [J]. INFORMATION SCIENCES, 2022, 589 : 580 - 594
  • [5] A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack
    Ge, Hui
    Zhao, Lei
    Yue, Dong
    Xie, Xiangpeng
    Xie, Linghai
    Gorbachev, Sergey
    Korovin, Iakov
    Ge, Yuan
    [J]. INFORMATION SCIENCES, 2024, 652
  • [6] Guo MY, 2023, AAAI CONF ARTIF INTE, P5649
  • [7] Guo MY, 2022, AAAI CONF ARTIF INTE, P9360
  • [8] Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model
    Han, Lansheng
    Zhou, Man
    Jia, Wenjing
    Dalil, Zakaria
    Xu, Xingbo
    [J]. INFORMATION SCIENCES, 2019, 476 : 491 - 504
  • [9] Attack scenario reconstruction approach using attack graph and alert data mining
    Hu, Hao
    Liu, Jing
    Zhang, Yuchen
    Liu, Yuling
    Xu, Xiaoyu
    Tan, Jinglei
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [10] Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game
    Hu, Hao
    Liu, Yuling
    Chen, Chen
    Zhang, Hongqi
    Liu, Yi
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1683 - 1700