Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks

Authors

  • Lamia Hamza Laboratory of Medical Informatics (LIMED), Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria
  • Mayliss Yousfi Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria
  • Lynda Bounehar Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria

DOI:

https://doi.org/10.13052/jcsm2245-1439.13510

Keywords:

Internet of Things, vulnerability, attack graph, game theory, Partially Observable Stochastic Game

Abstract

The Internet of Things (IoT) has transformed interactions with the world around us. This technology encompasses a network of connected physical devices often vulnerable to attack. Recently, with billions of devices connected, protecting sensitive data and preventing cyber-attacks are becoming more and more paramount. In this paper, a new technique is proposed to enable the administrator to be aware of the various vulnerabilities threatening his system and to choose the most appropriate remediation method based on his cost constraints. This solution adapts to the specific needs of IoT networks. The approach, AGA-POSG, consists of transforming an IoT network security problem into a finite two-player Partially Observable Stochastic Game (POSG) and extracting the best strategies by Analysing an Attack Graph (AGA). To obtain a good solution, the game is presented in normal form, and the method of eliminating dominated strategies is used to determine the best defense strategies. Efficient security measures were implemented to eliminate or mitigate identified attack paths with costs incurred in the attack graph to the target for each of the two players.

Downloads

Download data is not yet available.

Author Biographies

Lamia Hamza, Laboratory of Medical Informatics (LIMED), Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria

Lamia Hamza is an Associate Professor in the Department of Computer Science, University of Bejaia, Algeria; she is the Head of the Research Team for computer network security within the laboratory LIMED (Laboratoire d’Informatique MEDicale). She got his Accreditation to supervise (HDR), PhD, and Magister degrees from the University of Bejaia in 2020, 2018, and 2005, respectively. She received an engineering diploma in Computer Science from the University of Setif in 2003. Her research focuses on the automatic reinforcement of security policies using formal techniques, spam filtering based on Machine Learning, Blockchain, and intrusion detection in IoT and STI contexts.

Mayliss Yousfi, Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria

Mayliss Yousfi received a Bachelor’s degree in Networks and Security from the University of Bejaia in 2021, where she developed a strong understanding of the theoretical and practical foundations of computer networks and system security. Fascinated by this ever-evolving field, she continued her studies and earned a Master’s degree in Networks and Security from the same university in 2023. She is currently looking to apply her specialized skills in rewarding professional environments.

Lynda Bounehar, Faculty of Exact Sciences, University of Bejaia, 06000 Bejaia, Algeria

Lynda Bounehar received her Bachelor’s degree in Network and Security from the University of Bejaia in 2021, followed by a Master’s degree in the same field in 2023. Currently, she is pursuing a Master’s in Applied Methods in Computer Science for Business Management at the University of Lille. This varied academic career reflects her commitment to deepening her knowledge of information technology, particularly in the context of corporate information systems. These studies enabled her to acquire essential skills in project management methods and to understand the strategic importance of IT within organizations.

References

L. Hamza, Intruder model for generating attack scenarios in computer systems. International Journal of Information and Computer Security, num.(3–4), Vol.13, 2020.

Ingols, K., Lippmann, R., & Piwowarski, K. (2006). Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference (ACSAC’06) (pp. 121–130). IEEE.

Albanese, M., Jajodia, S., & Noel, S. (2012, June). Time-efficient and cost-effective network hardening using attack graphs. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (pp. 1–12). IEEE.

Noel, S. (2018). A review of graph approaches to network security analytics. From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, 300–323.

Nilima, P., & Nitin, P. (2012). A comparative study of network vulnerability analysis using attack graph. World Journal of Science and Technology, vol. 2, Issue 3, p. 91.

Lye, K. W., & Wing, J. M. (2005). Game strategies in network security. International Journal of Information Security, vol. 4, p. 71–86.

Jiang, W., Zhang, H. L., Tian, Z. H., & Song, X. F. (2007, December). A game theoretic method for decision and analysis of the optimal active defense strategy. In 2007 International Conference on Computational Intelligence and Security (CIS 2007) (pp. 819–823). IEEE.

K. Bouafia & L. Hamza, (2022), Game theory approach for analyzing attack graphs, International Journal of Information and Computer Security, Vol. 19(3–4), p. 305–320.

Anwar, A. H., Kamhoua, C., & Leslie, N. (2019, November). A game-theoretic framework for dynamic cyber deception in internet of battlefield things. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 522–526).

Yiğit, B., Gür, G., Alagöz, F., & Tellenbach, B. (2019). Cost-aware securing of IoT systems using attack graphs. Ad Hoc Networks, vol. 86, p. 23–35.

Almazrouei, O., & Magalingam, P. (2022, October). The Internet of Things Network Penetration Testing Model Using Attack Graph Analysis. In 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 360–368). IEEE.

Common Vulnerability Scoring System (CVSS), Retrieved from https://www.first.org/cvss/https://www.first.org/cvss/.

Bair, N., Hamza, L., & Ouali, L. (2021, December). Costs Technique for Analysis Attacks Graphs in Computer Systems. In 2021 24th International Conference on Computer and Information Technology (ICCIT) (pp. 1-6). IEEE. DOI: 10.1109/ICCIT54785.2021.9689915.

Ma, Y., Wu, Y., Yu, D., Ding, L., & Chen, Y. (2022). Vulnerability association evaluation of internet of thing devices based on attack graph. International Journal of Distributed Sensor Networks, vol. 18, no 5, p. 15501329221097817.

Chen, F., Liu, D., Zhang, Y., & Su, J. (2010). A scalable approach to analyzing network security using compact attack graphs. Journal of Networks, vol. 5, no. 5, p. 543.

National Vulnerability Database (NVD), Retrieved from https:/nvd.nist.gov.

Common Vulnerabilities and Exposures (CVE), Retrieved from https://www.cve.org/.

Downloads

Published

2024-09-03

How to Cite

1.
Hamza L, Yousfi M, Bounehar L. Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks. JCSANDM [Internet]. 2024 Sep. 3 [cited 2024 Nov. 22];13(05):1039-60. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24771

Issue

Section

Articles