Game-Theoretic Decision Support for Cyber Forensic Investigations

被引:10
作者
Nisioti, Antonia [1 ]
Loukas, George [1 ]
Rass, Stefan [2 ]
Panaousis, Emmanouil [1 ]
机构
[1] Univ Greenwich, Dept Comp & Math Sci, London SE10 9BD, England
[2] Univ Klagenfurt, Inst Artificial Intelligence & Cybersecur, Univ Str 65-67, A-9020 Klagenfurt, Austria
关键词
cyber forensics; digital forensics; game theory; bayesian game; multi-stage attacks; decision support; optimisation;
D O I
10.3390/s21165300
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players' actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker's type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.
引用
收藏
页数:22
相关论文
共 26 条
[1]  
Barnum S., 2012, Mitre Corporation, V11, P1
[2]  
Barre⠁re M., 2017, 2017 13 INT C NETWOR, P1
[3]   A cyber forensics ontology: Creating a new approach to studying cyber forensics [J].
Brinson, Ashley ;
Robinson, Abigail ;
Rogers, Marcus .
DIGITAL INVESTIGATION, 2006, :S37-S43
[4]  
CISA, 2019, RISK VULN ASS RVA MA
[5]  
de Braekt RI, 2016, 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P68, DOI 10.1109/ISDFS.2016.7473520
[6]   Game Theory for Cyber Security and Privacy [J].
Do, Cuong T. ;
Tran, Nguyen H. ;
Hong, Choongseon ;
Kamhoua, Charles A. ;
Kwiat, Kevin A. ;
Blasch, Erik ;
Ren, Shaolei ;
Pissinou, Niki ;
Iyengar, Sundaraja Sitharama .
ACM COMPUTING SURVEYS, 2017, 50 (02) :30-37
[7]  
Finnerty K., 2019, CYBER SECURITY BREAC
[8]   A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later [J].
Harichandran, Vikram S. ;
Breitinger, Frank ;
Baggili, Ibrahim ;
Marrington, Andrew .
COMPUTERS & SECURITY, 2016, 57 :1-13
[9]  
HARSANYI JC, 1972, MANAGE SCI B-APPL, V18, pP80
[10]   A game-theoretic defensive approach for forensic investigators against rootkits [J].
Hasanabadi, Saeed Shafiee ;
Lashkari, Arash Habibi ;
Ghorbani, Ali A. .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 33