2018
DOI: 10.1155/2018/2864873
|View full text |Cite
|
Sign up to set email alerts
|

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Abstract: We study the problem of allocating limited security countermeasures to protect network data from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multistage interactions between a network administrator and cybercriminals, formulated as a security game. This formulation is capable of representing security environments with significant dynamics and uncertainty and very large strategy spaces. We propose parameterized heuristic strategies for the attacker and defender and provide detaile… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(31 citation statements)
references
References 33 publications
0
31
0
Order By: Relevance
“…While these complex economic problems continue to be a primary application area of these methods [73][74][75][76], the general techniques have been applied in many different settings. These include analysis of interactions among heuristic meta-strategies in poker [77], network protocol compliance [78], collision avoidance in robotics [79], and security games [80][81][82].…”
Section: Most Closely Related Workmentioning
confidence: 99%
“…While these complex economic problems continue to be a primary application area of these methods [73][74][75][76], the general techniques have been applied in many different settings. These include analysis of interactions among heuristic meta-strategies in poker [77], network protocol compliance [78], collision avoidance in robotics [79], and security games [80][81][82].…”
Section: Most Closely Related Workmentioning
confidence: 99%
“…While these complex economic problems continue to be a primary application area of these methods [5,37,38,41], the general technique has been applied in many different settings. These include analysis interaction among heuristic meta-strategies in poker [24], network protocol compliance [43], collision avoidance in robotics [11], and security games [20,25,48]. Research that followed on Walsh's [39] initial work branched off in two directions: the first strand of work focused on strategic reasoning for simulation-based games [44], while the second strand focused on the evolutionary dynamical analysis of agent behavior inspired by evolutionary game theory [31,33].…”
Section: Related Workmentioning
confidence: 99%
“…Lastly, we will highlight works which reason about both these factors that will affect the overall Quality of Service (QoS) when an MTD is deployed. a) Considers only performance of individual defense actions: Similar to the case of security metrics, when we look at performance considerations for an individual defense, most game-theoretic works model these as a part of the defender's utility function [62], [78], [79], [80], [95]. Various equilibrium concepts in these games yield movement strategies for the defender that gives priority to constituent defenses that have low performance costs while ensuring that the security is not impacted by a lot.…”
Section: A) Considers Only Security Of Individual Defenses: Mostmentioning
confidence: 99%
“…Various equilibrium concepts in these games yield movement strategies for the defender that gives priority to constituent defenses that have low performance costs while ensuring that the security is not impacted by a lot. In [62] and [95], the reward functions are defined at an abstract level and the authors point out that they can be used to consider the performance cost of constituent defenses. In [78] and [79], the authors consider the impact of placing Network-based Intrusion Detection Systems (NIDS) on the latency of the network and use centrality based measures as heuristic guidance for it.…”
Section: A) Considers Only Security Of Individual Defenses: Mostmentioning
confidence: 99%
See 1 more Smart Citation