Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game

被引:0
|
作者
Zhang, Hangsheng [1 ,2 ]
Liu, Haitao [1 ,2 ]
Liang, Jie [1 ,2 ]
Li, Ting [1 ,2 ]
Geng, Liru [1 ,2 ]
Liu, Yinlong [1 ,2 ]
Chen, Shujuan [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] China Cybersecur Review Technol & Certificat Ctr, Beijing 100020, Peoples R China
关键词
Advanced Persistent Threat; Stackelberg games; attack graphs; policy hill-climbing; reinforcement learning (RL);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interaction between a defender who uses limited Security Resources(SRs) to harden network and an attacker who adopts a multi-stage plan to attack the network. The game model is derived from Stackelberg games called a Multi-stage Maze Network Game (M(2)NG) in which the characteristics of APT are fully considered. The possible plans of the attacker are compactly represented using attack graphs(AGs), but the compact representation of the attacker's strategies presents a computational challenge and reaching the Nash Equilibrium(NE) is NP-hard. We present a method that first translates AGs into Markov Decision Process(MDP) and then achieves the optimal SRs allocation using the policy hill-climbing(PHC) algorithm. Finally, we present an empirical evaluation of the model and analyze the scalability and sensitivity of the algorithm. Simulation results exhibit that our proposed reinforcement learning-based SRs allocation is feasible and efficient.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
  • [1] On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats
    Zhu, Quanyan
    Rass, Stefan
    [J]. IEEE ACCESS, 2018, 6 : 13958 - 13971
  • [2] Optimal Active Defense Using Dynamic Multi-Stage Signaling Game
    Zhang Hengwei
    Li Tao
    Wang Jindong
    Han Jihong
    [J]. CHINA COMMUNICATIONS, 2015, 12 (02) : 114 - 122
  • [3] A Multi-stage Game Approach Applied to Network Security Risk Controlling
    Li, Tao
    Wang, Jin-dong
    Chen, Yu
    Wang, Na
    [J]. 2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 2518 - 2522
  • [4] Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [5] Towards a Framework to Detect Multi-Stage Advanced Persistent Threats Attacks
    Bhatt, Parth
    Yano, Edgar Toshiro
    Gustavsson, Per M.
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 390 - 395
  • [6] Multi-layered Defense against Advanced Persistent Threats (APT)
    Torii, Satoru
    Morinaga, Masanobu
    Yoshioka, Takashi
    Terada, Takeaki
    Unno, Yuki
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2014, 50 (01): : 52 - 59
  • [7] Defense scheme against advanced persistent threats in mobile fog computing security
    Waqas, Muhammad
    Tu, Shanshan
    Wan, Jialin
    Mir, Talha
    Alasmary, Hisham
    Abbas, Ghulam
    [J]. COMPUTER NETWORKS, 2023, 221
  • [8] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [9] Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
    Acquaviva, Jeffrey
    Mahon, Mark
    Einfalt, Bruce
    LaPorta, Tom
    [J]. 2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 204 - 213
  • [10] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774