Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game

被引:0
|
作者
Zhang, Hangsheng [1 ,2 ]
Liu, Haitao [1 ,2 ]
Liang, Jie [1 ,2 ]
Li, Ting [1 ,2 ]
Geng, Liru [1 ,2 ]
Liu, Yinlong [1 ,2 ]
Chen, Shujuan [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] China Cybersecur Review Technol & Certificat Ctr, Beijing 100020, Peoples R China
关键词
Advanced Persistent Threat; Stackelberg games; attack graphs; policy hill-climbing; reinforcement learning (RL);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interaction between a defender who uses limited Security Resources(SRs) to harden network and an attacker who adopts a multi-stage plan to attack the network. The game model is derived from Stackelberg games called a Multi-stage Maze Network Game (M(2)NG) in which the characteristics of APT are fully considered. The possible plans of the attacker are compactly represented using attack graphs(AGs), but the compact representation of the attacker's strategies presents a computational challenge and reaching the Nash Equilibrium(NE) is NP-hard. We present a method that first translates AGs into Markov Decision Process(MDP) and then achieves the optimal SRs allocation using the policy hill-climbing(PHC) algorithm. Finally, we present an empirical evaluation of the model and analyze the scalability and sensitivity of the algorithm. Simulation results exhibit that our proposed reinforcement learning-based SRs allocation is feasible and efficient.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
  • [21] Multi-Stage Optimal Placement of Branch PMU in Active Distribution Network
    Wang Shu
    Kong Xiangrui
    Yan Zheng
    Xu Xiaoyuan
    Wang Han
    [J]. INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS, 2018, 19 (04)
  • [22] A differential privacy based multi-stage network fingerprinting deception game method
    He, Yuan
    Xing, Changyou
    Ding, Ke
    Zhang, Guomin
    Song, Lihua
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [23] Aircraft identification using a multi-stage fuzzy neural network
    Xu, XJ
    Constantinides, AG
    [J]. ICR '96 - 1996 CIE INTERNATIONAL CONFERENCE OF RADAR, PROCEEDINGS, 1996, : 151 - 155
  • [24] Daily insolation forecasting using a multi-stage neural network
    Kemmoku, Y
    Orita, S
    Nakagawa, S
    Sakakibara, T
    [J]. SOLAR ENERGY, 1999, 66 (03) : 193 - 199
  • [25] Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review
    Khalid, Mohd Nor Akmal
    Al-Kadhimi, Amjed Ahmed
    Singh, Manmeet Mahinderjit
    [J]. MATHEMATICS, 2023, 11 (06)
  • [26] Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach
    Li, Huiling
    Wu, Jun
    Xu, Hansong
    Li, Gaolei
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 757 - 775
  • [27] GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
    Rass, Stefan
    Zhu, Quanyan
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 314 - 326
  • [28] Structure Damage Detection Using Neural Network with Multi-Stage Substructuring
    Bakhary, Norhisham
    Hao, Hong
    Deeks, Andrew J.
    [J]. ADVANCES IN STRUCTURAL ENGINEERING, 2010, 13 (01) : 95 - 110
  • [29] A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning
    Althunayyan, Muzun
    Javed, Amir
    Rana, Omer
    [J]. VEHICULAR COMMUNICATIONS, 2024, 49
  • [30] Performance evaluation of a multi-stage network event detection scheme against DDoS attacks
    Murase, Tutornu
    Fukushima, Yukinobu
    Kobayashi, Masayoshi
    Fujiwara, Hiroki
    Fujimaki, Ryohei
    Yokohira, Tokunii
    [J]. 2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 58 - +