Reasoning about Sequential Cyberattacks

被引:0
作者
Paliath, Vivin [1 ]
Shakarian, Paulo [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
来源
PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019) | 2019年
关键词
cybersecurity; cyber-attack modeling; adversarial reasoning; ATTACK; MODEL;
D O I
10.1145/3341161.3343522
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber adversaries employ a variety of malware and exploits to attack computer systems, usually via sequential or "chained" attacks, that take advantage of vulnerability dependencies. In this paper, we introduce a formalism to model such attacks. We show that the determination of the set of capabilities gained by an attacker, which also translates to extent to which the system is compromised, corresponds with the convergence of a simple fixed-point operator. We then address the problem of determining the optimal/most-dangerous strategy for a cyber-adversary with respect to this model and find it to be an NP-Complete problem. To address this complexity we utilize an A*-based approach with an admissible heuristic, that incorporates the result of the fixed-point operator and uses memoization for greater efficiency. We provide an implementation and show through a suite of experiments, using both simulated and actual vulnerability data, that this method performs well in practice for identifying adversarial courses of action in this domain. On average, we found that our techniques decrease runtime by 82%.
引用
收藏
页码:855 / 862
页数:8
相关论文
共 14 条
  • [1] An automated approach to generate Web applications attack scenarios
    Alata, Eric
    Kaaniche, Mohamed
    Nicomette, Vincent
    Akrout, Rim
    [J]. 2013 SIXTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2013, : 78 - 85
  • [2] A Graphical Model to Assess the Impact of Multi-Step Attacks
    Albanese, Massimiliano
    Jajodia, Sushil
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 79 - 93
  • [3] [Anonymous], 2006, P 13 ACM C COMPUTER, DOI DOI 10.1145/1180405.1180446
  • [4] Petri Net Modeling of Cyber-Physical Attacks on Smart Grid
    Chen, Thomas M.
    Carlos Sanchez-Aarnoutse, Juan
    Buford, John
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 741 - 749
  • [5] A systematic approach to multi-stage network attack analysis
    Dawkins, J
    Hale, J
    [J]. SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 48 - 56
  • [6] DeLaBriandais R., 1959, MARCH 3 5 1959 W JOI, P295, DOI [10.1145/1457838.1457895, DOI 10.1145/1457838.1457895]
  • [7] Jajodia S, 2005, MASSIVE COMP, V5, P247, DOI 10.1007/0-387-24230-9_9
  • [8] An approach to model network exploitations using exploitation graphs
    Li, We
    Vaughn, Rayford B.
    Dandass, Yoginder S.
    [J]. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2006, 82 (08): : 523 - 541
  • [9] Robertson J., 2016, Cyber Defense Review, V1
  • [10] Robertson J.J., 2016, Innovative Applications of Artificial Intelligence, V28