Keeping Intruders at Large A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions

被引:0
作者
Shakarian, Paulo [1 ]
Paulo, Damon [2 ]
Albanese, Massimiliano [3 ]
Jajodia, Sushil [4 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] US Mil Acad, West Point, NY 10996 USA
[3] George Mason Univ, Fairfax, VA 22030 USA
[4] MITRE Corp, Mclean, VA USA
来源
2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT) | 2014年
关键词
Moving Target Defense; Adversarial Modeling; Graph Theory;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is well known that not all intrusions can be prevented and additional lines of defense are needed to deal with intruders. However, most current approaches use honeynets relying on the assumption that simply attracting intruders into honeypots would thwart the attack. In this paper, we propose a different and more realistic approach, which aims at delaying intrusions, so as to control the probability that an intruder will reach a certain goal within a specified amount of time. Our method relies on analyzing a graphical representation of the computer network's logical layout and an associated probabilistic model of the adversary's behavior. We then artificially modify this representation by adding "distraction clusters" - collections of interconnected virtual machines - at key points of the network in order to increase complexity for the intruders and delay the intrusion. We study this problem formally, showing it to be NP-hard and then provide an approximation algorithm that exhibits several useful properties. Finally, we present experimental results obtained on a prototypal implementation of the proposed framework.
引用
收藏
页码:19 / 30
页数:12
相关论文
共 14 条
  • [1] Abbasi FH, 2012, IEEE GLOB COMM CONF, P891, DOI 10.1109/GLOCOM.2012.6503226
  • [2] Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
  • [3] A proactive approach to intrusion detection and malware collection
    Chen, Chia-Mei
    Cheng, Sheng-Tzong
    Zeng, Ruei-Yu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 844 - 853
  • [4] Chen W, 2010, P 16 ACM SIGKDD INT, P1029, DOI DOI 10.1145/1835804.1835934
  • [5] Evans D, 2011, ADV INFORM SECUR, V54, P29
  • [6] A threshold of in n for approximating set cover
    Feige, U
    [J]. JOURNAL OF THE ACM, 1998, 45 (04) : 634 - 652
  • [7] Jajodia S, 2011, ADV INFORM SECUR, V54, P1, DOI 10.1007/978-1-4614-0977-9
  • [8] Jajodia S., 2013, APPL GAME THEORY ADV, V100, P203
  • [9] An Attack Surface Metric
    Manadhata, Pratyusa K.
    Wing, Jeannette M.
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2011, 37 (03) : 371 - 386
  • [10] ANALYSIS OF APPROXIMATIONS FOR MAXIMIZING SUBMODULAR SET FUNCTIONS .1.
    NEMHAUSER, GL
    WOLSEY, LA
    FISHER, ML
    [J]. MATHEMATICAL PROGRAMMING, 1978, 14 (03) : 265 - 294