Thimblerig: A Game-Theoretic, Adaptive, Risk-limiting Security System for Cloud Systems

被引:0
|
作者
Kumar, Gautam [1 ]
Lagesse, Brent [1 ]
机构
[1] Univ Washington Bothell, Bothell, WA 98011 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/NOMS59830.2024.10575857
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A significant portion of organizations and applications host client facing servers on cloud-based systems. As the first line of access into a system's services, these client-facing servers have a significant attack surface from network adversaries. Once compromised, these systems may be used to send spam, mine crypto, launch DDoS attacks, or used for other nefarious purposes. We propose an adaptive moving target defense that uses game theory to optimize the security and cost to the cloud system. This system leverages the fault-tolerant capabilities of cloud systems with large numbers of client facing servers and the virtualization of these client facing servers by strategically crashing random systems. As a result, an attacker who has compromised a system loses access to it and incurs the cost of having to re-compromise the system once they notice it has been lost. This approach drastically limits the amount of time that an attacker can utilize compromised systems and raises the overall investment required for that time. We have demonstrated via simulation a 90% reduction in the amount of time that an attacker has control over a compromised system for realistic scenarios based on previous data collection of live systems. This approach is agnostic to the method of compromise, so it is even effective against zero-day attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [2] A game-theoretic framework for the security system of visible watermarking
    Tsai, Min-Jen
    Liu, Jung
    Wang, Chen-Sheng
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5748 - 5754
  • [3] Noncooperative game-theoretic model for security enhancement in cloud gaming environments
    Evangeline, S. Jebarani
    Yadav, Ajit Kumar Singh
    Balaji, V. R.
    Sivaganesan, D.
    Kumar, A. Senthil
    Sivaraju, S. S.
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2024,
  • [4] Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems
    Cardellini, Valeria
    Di Valerio, Valerio
    Presti, Francesco Lo
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (01) : 86 - 98
  • [5] Trading the Cloud: A Game-Theoretic Approach
    Zheng, Xianrong
    AMCIS 2020 PROCEEDINGS, 2020,
  • [6] Adaptive Risk-Limiting Comparison Audits
    Fuller, Benjamin
    Harrison, Abigail
    Russell, Alexander
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 3314 - 3331
  • [7] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [8] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [9] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [10] Revenue sharing in edge-cloud systems: A Game-theoretic perspective
    Cao, Zhi
    Zhang, Honggang
    Liu, Benyuan
    Sheng, Bo
    COMPUTER NETWORKS, 2020, 176 (176)