Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2772879.2773429acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
poster

Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs

Published: 04 May 2015 Publication History

Abstract

In network security hardening a network administrator may need to use limited resources (such as honeypots) to harden a network against possible attacks. Attack graphs are a common formal model used to represent possible attacks. However, most existing works on attack graphs do not consider the reactions of attackers to different defender strategies. We introduce a game-theoretic model of the joint problem where attacker's strategies are represented using attack graphs, and defender's strategies are represented as modifications of the attack graph. The attack graphs we use allow for sequential attack actions with associated costs and probabilities of success/failure. We present an algorithm for an computing attack policy that maximizes attacker's expected reward and empirical results demonstrating our methods on a case study network.

References

[1]
K. Durkota and V. Lisý. Computing optimal policies for attack graphs with action failures and costs. In STAIRS, pages 101--110, 2014.
[2]
R. Greiner, R. Hayward, M. Jankowska, and M. Molloy. Finding optimal satisficing strategies for and-or trees. Artificial Intelligence, pages 19--58, 2006.
[3]
J. Homer, X. Ou, and D. Schmidt. A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University, 2009.
[4]
S. Noel, S. Jajodia, L. Wang, and A. Singhal. Measuring security risk of networks using attack graphs. International Journal of Next-Generation Computing, 1(1):135--147, 2010.
[5]
X. Ou, W. F. Boyer, and M. A. McQueen. A scalable approach to attack graph generation. In CCS, pages 336--345, 2006.
[6]
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing. Automated generation and analysis of attack graphs. In IEEE S&P, pages 273--284, 2002.
[7]
L. Spitzner. Honeypots: tracking hackers. Addison-Wesley Reading, 2003.
[8]
M. Tambe. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, 2011.

Cited By

View all
  • (2016)Defense-in-depth vs. critical component defense for industrial control systemsProceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 201610.14236/ewic/ICS2016.1(1-10)Online publication date: 23-Aug-2016

Index Terms

  1. Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
      May 2015
      2072 pages
      ISBN:9781450334136

      Sponsors

      • IFAAMAS

      In-Cooperation

      Publisher

      International Foundation for Autonomous Agents and Multiagent Systems

      Richland, SC

      Publication History

      Published: 04 May 2015

      Check for updates

      Author Tags

      1. and-or graph
      2. attack graphs
      3. game theory
      4. honeypots
      5. network security
      6. optimal attack policy

      Qualifiers

      • Poster

      Funding Sources

      • Sino-Danish Center for the Theory of Interactive Computation
      • Office of Naval Research Global

      Conference

      AAMAS'15
      Sponsor:

      Acceptance Rates

      AAMAS '15 Paper Acceptance Rate 108 of 670 submissions, 16%;
      Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 30 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)Defense-in-depth vs. critical component defense for industrial control systemsProceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 201610.14236/ewic/ICS2016.1(1-10)Online publication date: 23-Aug-2016

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media