ANALYZING ADVANCED PERSISTENT THREATS USING GAME THEORY: A CRITICAL LITERATURE REVIEW

被引:3
作者
Kumar, Rajesh
Singh, Siddhant
Kela, Rohan
机构
来源
CRITICAL INFRASTRUCTURE PROTECTION XV, ICCIP 2021 | 2022年 / 636卷
关键词
Advanced persistent threats; game theory; literature review; FRAMEWORK; DEFENSE;
D O I
10.1007/978-3-030-93511-5_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threats present significant security challenges due to their customized, stealthy and adaptive nature. Since no generic solution exists to combat advanced persistent threats, the recommended option is to employ information security best practices. While practitioner-oriented security guidelines have been published by the International Organization for Standardization and the U.S. National Institute of Standards and Technology, they cannot be employed in rigorous quantitative analyses required for objective decision making such as choosing countermeasures that balance security, cost and usability. In contrast, gametheoretic approaches, which express the behavior of rational agents that maximize their utility, provide appropriate models for objective decision making. This chapter conducts a critical analysis of several game-theoretic approaches for analyzing advanced persistent threats. Eleven highly-cited, peer-reviewed articles from the research literature are examined in terms of their objectives, features, game models and solutions. The models provide valuable insights into advanced persistent threat behavior, support resource-optimal decision making and can be mapped to the various risk management stages. However, they have some delicate modeling and analysis limitations. The critical analysis exposes the omissions in the literature and points to future research focused on integrating practitioner perspectives in game-theoretic approaches to advance information security risk management.
引用
收藏
页码:45 / 69
页数:25
相关论文
共 51 条
[1]   Information Leakage in Cloud Data Warehouses [J].
Ahmadian, Mohammad ;
Marinescu, Dan C. .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02) :192-203
[2]   A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities [J].
Alshamrani, Adel ;
Myneni, Sowmya ;
Chowdhary, Ankur ;
Huang, Dijiang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1851-1877
[3]  
[Anonymous], 2011, Managing Information Security Risk: Organization, Mission, and Information System View, SP 800-39
[4]  
[Anonymous], 2018, Risk management: Guidelines
[5]  
[Anonymous], 2020, About ScienceDirect
[6]   Advanced persistent threats: Minimising the damage [J].
Brewer, Ross .
Network Security, 2014, 2014 (04) :5-9
[7]   A comprehensive survey of multiagent reinforcement learning [J].
Busoniu, Lucian ;
Babuska, Robert ;
De Schutter, Bart .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2008, 38 (02) :156-172
[8]  
Cavusoglu H., 2002, P INT C INF SYST, P749
[9]  
Chen P, 2014, LECT NOTES COMPUT SC, V8735, P63, DOI 10.1007/978-3-662-44885-4_5
[10]  
Cohen F., 2006, Handbook of Information Security, V3, P646