A Two-Stage Deception Game for Network Defense

被引:4
作者
Wang, Wei [1 ]
Zeng, Bo [1 ]
机构
[1] Univ Pittsburgh, Pittsburgh, PA 15260 USA
来源
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018 | 2018年 / 11199卷
关键词
Two-stage security game; Game theory; Cyber security; Network security; Deception;
D O I
10.1007/978-3-030-01554-1_33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computer network is always under the threat of adversaries. Before launching any real attacks, adversaries may scan and probe the systems to gain some key information. In this paper, we build a two-stage deception game to determine how to answer attackers' scan and probe queries to minimize defender's expected loss. To achieve optimal defense strategy, a sophisticated mixed integer program is formulated. To support fast computation in reality, a two-stage heuristic method is also developed based on the problem's structural properties. Computational experiment shows that after scanning the whole network, adversary's probe against some hosts and how such probe is responded have significant influences on defender's expected loss. Our heuristic method is able to produce high quality solutions with a drastically improved computational performance.
引用
收藏
页码:569 / 582
页数:14
相关论文
共 24 条
  • [1] Albanese M, 2015, IEEE CONF COMM NETW, P317, DOI 10.1109/CNS.2015.7346842
  • [2] Albanese Massimiliano., 2016, Cyber Deception, P169, DOI DOI 10.1007/978-3-319-32699-3_8
  • [3] [Anonymous], 2016, The Times
  • [4] [Anonymous], 2009, INSECURE
  • [5] SinFP, unification of active and passive operating system fingerprinting
    Auffret, Patrice
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2010, 6 (03): : 197 - 205
  • [6] Julia: A Fresh Approach to Numerical Computing
    Bezanson, Jeff
    Edelman, Alan
    Karpinski, Stefan
    Shah, Viral B.
    [J]. SIAM REVIEW, 2017, 59 (01) : 65 - 98
  • [7] A two-sided optimization for theater ballistic missile defense
    Brown, G
    Carlyle, M
    Diehl, D
    Kline, J
    Wood, K
    [J]. OPERATIONS RESEARCH, 2005, 53 (05) : 745 - 763
  • [8] Cai JY, 2009, LECT NOTES COMPUT SC, V5609, P7, DOI 10.1007/978-3-642-02882-3_2
  • [9] A game theoretic investigation of deception in network security
    Carroll, Thomas E.
    Grosu, Daniel
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1162 - 1172
  • [10] NoSEBrEaK - Attacking honeynets
    Dornseif, M
    Holz, T
    Klein, CN
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 123 - 129