Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats

被引:2
|
作者
Chen, Ziqin [1 ,2 ]
Chen, Guanpu [3 ]
Hong, Yiguang [1 ,2 ]
机构
[1] Tongji Univ, Dept Control Sci & Engn, Shanghai, Peoples R China
[2] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai, Peoples R China
[3] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
关键词
Security game; advanced persistent threat; insider threats; Nash equilibrium; STRATEGY; SYSTEMS; GAME; FLIPIT;
D O I
10.1142/S2301385024410152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a game theory framework to solve advanced persistent threat problems, especially considering two types of insider threats: malicious and inadvertent. Within this framework, we establish a unified three-player game model and derive Nash equilibria in response to different types of insider threats. By analyzing these Nash equilibria, we provide quantitative solutions to advanced persistent threat problems pertaining to insider threats. Furthermore, we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider threats. Interestingly, our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones, despite the latter imposing a higher burden on the defender. Our theoretical results are substantiated by numerical results, which additionally include a detailed exploration of the conditions under which different insiders adopt risky strategies. These conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
引用
收藏
页码:341 / 358
页数:18
相关论文
共 50 条
  • [41] Malicious Data Leak Prevention and Purposeful Evasion Attacks: An Approach to Advanced Persistent Threat (APT) Management
    Mustafa, Tarique
    2013 SAUDI INTERNATIONAL ELECTRONICS, COMMUNICATIONS AND PHOTONICS CONFERENCE (SIECPC), 2013,
  • [42] System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis
    Fagade, Tesleem
    Spyridopoulos, Theo
    Albishry, Nabeel
    Tryfonas, Theo
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 309 - 321
  • [43] The prevent of advanced persistent threat
    Beijing University of Posts and Telecommunications, China
    不详
    不详
    J. Chem. Pharm. Res., 7 (572-576):
  • [44] A Study on Advanced Persistent Threat
    Cinar, Cihan
    Alkan, Mustafa
    Dorterler, Murat
    Dogru, Ibrahim Alper
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 116 - 121
  • [45] Insider Threat Mitigation Using Moving Target Defense and Deception
    Takabi, Hassan
    Jafarian, J. Haadi
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 93 - 96
  • [46] From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data
    Nanamou, N'Famoussa Kounon
    Neal, Christopher
    Boulahia-Cuppens, Nora
    Cuppens, Frederic
    Bkakria, Anis
    INFORMATION SYSTEMS SECURITY, ICISS 2024, 2025, 15416 : 180 - 200
  • [47] Cumulative Prospect Theoretic Study of A Cloud Storage Defense Game Against Advanced Persistent Threats
    Xu, Dongjin
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 541 - 546
  • [48] Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4250 - 4261
  • [49] A Practical Study on Advanced Persistent Threats
    Jeun, Inkyung
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 144 - +
  • [50] Advanced Persistent Threats & Social Engineering
    Weippl, Edgar
    2014 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2014, : IS21 - IS21