Gamifying information security: Adversarial risk exploration for IT/OT infrastructures

被引:0
作者
Luh, Robert [1 ,2 ]
Eresheim, Sebastian [1 ,2 ]
Tavolato, Paul [2 ]
Petelin, Thomas [2 ]
Gmeiner, Simon [1 ,2 ]
Holzinger, Andreas [3 ]
Schrittwieser, Sebastian [2 ]
机构
[1] St Polten Univ Appl Sci, Dept Comp Sci & Secur, Campus Pl 1, St Polten, Austria
[2] Univ Vienna, Fac Comp Sci, Wahringer Str 29, Vienna, Austria
[3] BOKU Univ Vienna, Dept Forest & Soil Sci, Peter Jordan Str 82, Vienna, Austria
基金
奥地利科学基金会;
关键词
Hacking; Security game; Model; Gamification;
D O I
10.1016/j.cose.2024.104287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's interconnected IT and OT infrastructure faces an array of cyber threats from diverse actors with varying motivations and capabilities. The increasing complexity of exposed systems, coupled with adversaries' sophisticated technical arsenals, poses significant challenges for organizations seeking to defend against these attacks. Understanding the relationship between specific attack techniques and effective technical, organizational and human-centric mitigation measures remains elusive, as does grasping the underlying principles of information security and how they maybe applied to cyber defense. In response to these challenges, we propose a gamified metamodel that combines well-established frameworks, including MITRE ATT&CK, D3FEND, CAPEC, and the NIST SP 800-53 security standard. The programmatic implementation of the model, "PenQuest", combines elements of game theory with cybersecurity concepts to enhance risk assessment and training for IT practitioners and security engineers. In PenQuest, participants engage in a digital battle - attackers attempt to compromise an abstracted IT infrastructure, while defenders work to prevent or mitigate the threat. Bot opponents and the technical foundation for reinforcement learning enable future automated strategy inference. This paper provides an in-depth exploration of the metamodel, the game's components and features built to translate cybersecurity principles into strategy game rules, and the technical implementation of a mature, ready-to-use education and risk exploration solution. Future work will focus on further improving the attack likelihood and detection chance algorithms for seamless risk assessment.
引用
收藏
页数:22
相关论文
共 72 条
  • [1] Abdallah M., Cason T., Bagchi S., Sundaram S., The effect of behavioral probability weighting in a sequential defender-attacker game, 2020 59th IEEE Conference on Decision and Control, CDC, pp. 3255-3260, (2020)
  • [2] Abt C., Serious Games, (1987)
  • [3] Bartle R., Hearts, clubs, diamonds, spades: Players who suit MUDs, (1996)
  • [4] Batzos Z., Saoulidis T., Margounakis D., Fountoukidis E., Grigoriou E., Moukoulis A., Sarigiannidis A., Liatifis A., Karipidis P., Bibi S., Filippidis A., Kazanidis I., Nifakos S., Kasig T., Heydari M., Mouratidis H., Gamification and serious games for cybersecurity awareness and first responders training: An overview, (2023)
  • [5] Black Hills Information Security Z., Backdoors & Breaches, (2024)
  • [6] Broniatowski D., Psychological foundations of explainability and interpretability in artificial intelligence, (2021)
  • [7] Bundesamt fur Sicherheit in der Informationstechnik (BSI) D., IT-Grundschutz-Kompendium, (2023)
  • [8] Casey E., Back G., Barnum S., Leveraging CybOX to standardize representation and exchange of digital forensic information, Digit. Investig., 12, pp. S102-S110, (2015)
  • [9] Cybersecurity and Infrastructure Security Agency (CISA) E., FY22 risk and vulnerability assessment analysis, (2023)
  • [10] Cybersecurityventures.com E., Global Ransomware Damage Costs Predicted To Exceed $265 Billion By 2031, (2024)