Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats

被引:2
|
作者
Chen, Ziqin [1 ,2 ]
Chen, Guanpu [3 ]
Hong, Yiguang [1 ,2 ]
机构
[1] Tongji Univ, Dept Control Sci & Engn, Shanghai, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai, Peoples R China
[3] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
关键词
Security game; advanced persistent threat; insider threats; Nash equilibrium; STRATEGY; SYSTEMS; GAME; FLIPIT;
D O I
10.1142/S2301385024410152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a game theory framework to solve advanced persistent threat problems, especially considering two types of insider threats: malicious and inadvertent. Within this framework, we establish a unified three-player game model and derive Nash equilibria in response to different types of insider threats. By analyzing these Nash equilibria, we provide quantitative solutions to advanced persistent threat problems pertaining to insider threats. Furthermore, we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider threats. Interestingly, our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones, despite the latter imposing a higher burden on the defender. Our theoretical results are substantiated by numerical results, which additionally include a detailed exploration of the conditions under which different insiders adopt risky strategies. These conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
引用
收藏
页码:341 / 358
页数:18
相关论文
共 50 条
  • [1] Advanced Persistent Threats - Detection and Defense
    Vukalovic, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1324 - 1330
  • [2] Mitigating Inadvertent Insider Threats with Incentives
    Liu, Debin
    Wang, XiaoFeng
    Camp, L. Jean
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 1 - 16
  • [3] An adaptive defense mechanism to prevent advanced persistent threats
    Xie, Yi-xi
    Ji, Li-xin
    Li, Ling-shu
    Guo, Zehua
    Baker, Thar
    CONNECTION SCIENCE, 2021, 33 (02) : 359 - 379
  • [4] Malicious Users' Transactions: Tackling Insider Threat
    Li, Weihan
    Panda, Brajendra
    Yaseen, Qussai
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 211 - 222
  • [5] Impulsive Artificial Defense Against Advanced Persistent Threat
    Sun, Hao
    Yang, Xiaofan
    Yang, Lu-Xing
    Huang, Kaifan
    Li, Gang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3506 - 3516
  • [6] Mitigating Malicious Updates: Prevention of Insider Threat to Databases
    Ragavan, Harini
    Panda, Brajendra
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 781 - 788
  • [7] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [8] Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
    Hu, Pengfei
    Li, Hongxing
    Fu, Hao
    Cansever, Derya
    Mohapatra, Prasant
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [9] Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Han, Liangxiu
    Raza, Umar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [10] Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement
    Khosravi-Farmad, Masoud
    Ramaki, Ali Ahmadian
    Bafghi, Abbas Ghaemi
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2018, : 280 - 285