Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats

被引:2
|
作者
Chen, Ziqin [1 ,2 ]
Chen, Guanpu [3 ]
Hong, Yiguang [1 ,2 ]
机构
[1] Tongji Univ, Dept Control Sci & Engn, Shanghai, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai, Peoples R China
[3] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
关键词
Security game; advanced persistent threat; insider threats; Nash equilibrium; STRATEGY; SYSTEMS; GAME; FLIPIT;
D O I
10.1142/S2301385024410152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a game theory framework to solve advanced persistent threat problems, especially considering two types of insider threats: malicious and inadvertent. Within this framework, we establish a unified three-player game model and derive Nash equilibria in response to different types of insider threats. By analyzing these Nash equilibria, we provide quantitative solutions to advanced persistent threat problems pertaining to insider threats. Furthermore, we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider threats. Interestingly, our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones, despite the latter imposing a higher burden on the defender. Our theoretical results are substantiated by numerical results, which additionally include a detailed exploration of the conditions under which different insiders adopt risky strategies. These conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
引用
收藏
页码:341 / 358
页数:18
相关论文
共 50 条
  • [31] Defense of Advanced Persistent Threat on Industrial Internet of Things With Lateral Movement Modeling
    Bi, Jichao
    He, Shibo
    Luo, Fengji
    Meng, Wenchao
    Ji, Luyue
    Huang, Da-Wen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (09) : 9619 - 9630
  • [32] Dynamic defense strategy against advanced persistent threat under heterogeneous networks
    Lv, Kun
    Chen, Yun
    Hu, Changzhen
    INFORMATION FUSION, 2019, 49 : 216 - 226
  • [33] Malicious Insider Threats in Tactical MANET: The Performace Analysis of DSR Routing Protocol
    Shabut, Antesar M.
    Dahal, Keshav
    Kaiser, M. Shamim
    Hossain, M. A.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 390 - 395
  • [34] An Active Defense Model and Framework of Insider Threats Detection and Sense
    Zhang, Hongbin
    Ma, Jianfeng
    Wang, Yinchuan
    Pei, Qingqi
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 258 - +
  • [35] An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats
    Li, Yuqing
    Dai, Wenkuan
    Bai, Jie
    Gan, Xiaoying
    Wang, Jingchao
    Wang, Xinbing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 646 - 661
  • [36] Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    Huang, Shuhua
    IEEE ACCESS, 2020, 8 (08): : 64075 - 64085
  • [37] Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
    Acquaviva, Jeffrey
    Mahon, Mark
    Einfalt, Bruce
    LaPorta, Tom
    2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 204 - 213
  • [38] Advanced Risk Measurement Approach to Insider Threats in Cyberspace
    Cho, Inhyun
    Lee, Kyungho
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 405 - 413
  • [39] Analysing Non-Malicious Threats to Urban Smart Grids by Interrelating Threats and Threat Taxonomies
    Vasenev, Alexandr
    Montoya, Lorena
    IEEE SECOND INTERNATIONAL SMART CITIES CONFERENCE (ISC2 2016), 2016, : 811 - 814
  • [40] Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics
    Kenny, Matt
    Pitropakis, Nikolaos
    Sayeed, Sarwar
    Chrysoulas, Christos
    Mylonas, Alexios
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 264 - 278