Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats

被引:2
|
作者
Chen, Ziqin [1 ,2 ]
Chen, Guanpu [3 ]
Hong, Yiguang [1 ,2 ]
机构
[1] Tongji Univ, Dept Control Sci & Engn, Shanghai, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai, Peoples R China
[3] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
关键词
Security game; advanced persistent threat; insider threats; Nash equilibrium; STRATEGY; SYSTEMS; GAME; FLIPIT;
D O I
10.1142/S2301385024410152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a game theory framework to solve advanced persistent threat problems, especially considering two types of insider threats: malicious and inadvertent. Within this framework, we establish a unified three-player game model and derive Nash equilibria in response to different types of insider threats. By analyzing these Nash equilibria, we provide quantitative solutions to advanced persistent threat problems pertaining to insider threats. Furthermore, we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider threats. Interestingly, our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones, despite the latter imposing a higher burden on the defender. Our theoretical results are substantiated by numerical results, which additionally include a detailed exploration of the conditions under which different insiders adopt risky strategies. These conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
引用
收藏
页码:341 / 358
页数:18
相关论文
共 50 条
  • [21] MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats
    Moon, Daesung
    Im, Hyungjin
    Lee, Jae Dong
    Park, Jong Hyuk
    SYMMETRY-BASEL, 2014, 6 (04): : 997 - 1010
  • [22] Defense Against Advanced Persistent Threats in Smart Grids: A Reinforcement Learning Approach
    Ning, Baifeng
    Xiao, Liang
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8598 - 8603
  • [23] Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats
    Xu, Dongjin
    Li, Yanda
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [24] TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition
    Harilal, Athul
    Toffalini, Flavio
    Castellanos, John
    Guarnizo, Juan
    Homoliak, Ivan
    Ochoa, Martin
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 45 - 56
  • [25] Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity
    Legg, Philip A.
    2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2015,
  • [26] Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases
    Chagarlamudi, Manideep
    Panda, Brajendra
    Hu, Yi
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1616 - +
  • [27] Insider Threat Defense Strategies: Survey and Knowledge Integration
    Song, Chengyu
    Zhang, Jingjing
    Ma, Linru
    Hu, Xinxin
    Zheng, Jianming
    Yang, Lin
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT V, KSEM 2024, 2024, 14888 : 106 - 122
  • [28] A Study on Advanced Persistent Threats
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 63 - 72
  • [29] Malicious Insider Threats in Tactical MANET: The Performance Analysis of DSR Routing Protocol
    Shabut, Antesar M.
    Dahal, Keshav
    Kaiser, M. Shamim
    Hossain, M. A.
    2017 IEEE REGION 10 HUMANITARIAN TECHNOLOGY CONFERENCE (R10-HTC), 2017, : 187 - 192
  • [30] A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats
    Hashem, Yassir
    Takabi, Hassan
    Dantu, Ram
    Nielsen, Rodney
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 33 - 44