Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game

被引:0
|
作者
Zhang, Hangsheng [1 ,2 ]
Liu, Haitao [1 ,2 ]
Liang, Jie [1 ,2 ]
Li, Ting [1 ,2 ]
Geng, Liru [1 ,2 ]
Liu, Yinlong [1 ,2 ]
Chen, Shujuan [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] China Cybersecur Review Technol & Certificat Ctr, Beijing 100020, Peoples R China
关键词
Advanced Persistent Threat; Stackelberg games; attack graphs; policy hill-climbing; reinforcement learning (RL);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interaction between a defender who uses limited Security Resources(SRs) to harden network and an attacker who adopts a multi-stage plan to attack the network. The game model is derived from Stackelberg games called a Multi-stage Maze Network Game (M(2)NG) in which the characteristics of APT are fully considered. The possible plans of the attacker are compactly represented using attack graphs(AGs), but the compact representation of the attacker's strategies presents a computational challenge and reaching the Nash Equilibrium(NE) is NP-hard. We present a method that first translates AGs into Markov Decision Process(MDP) and then achieves the optimal SRs allocation using the policy hill-climbing(PHC) algorithm. Finally, we present an empirical evaluation of the model and analyze the scalability and sensitivity of the algorithm. Simulation results exhibit that our proposed reinforcement learning-based SRs allocation is feasible and efficient.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
  • [41] Substructuring Technique for Damage Detection Using Statistical Multi-Stage Artificial Neural Network
    Bakhary, Norhisham
    Hao, Hong
    Deeks, Andrew J.
    ADVANCES IN STRUCTURAL ENGINEERING, 2010, 13 (04) : 619 - 639
  • [42] Enhanced rolling bearing fault diagnosis using a multi-stage attention fusion network
    Ma, Mingyuan
    Qu, Chenxi
    Zhao, Xudong
    Li, Fenglei
    Qu, Shengguan
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2025,
  • [43] Pose estimation at night in infrared images using a lightweight multi-stage attention network
    Zang, Ying
    Fan, Chunpeng
    Zheng, Zeyu
    Yang, Dongsheng
    SIGNAL IMAGE AND VIDEO PROCESSING, 2021, 15 (08) : 1757 - 1765
  • [44] Fast Single Image Reflection Removal Using Multi-Stage Scale Space Network
    Prasad, B. H. Pawan
    Rosh, Green
    Lokesh, R. B.
    Mitra, Kaushik
    IEEE ACCESS, 2024, 12 : 146901 - 146914
  • [45] Multi-Stage Dynamic Transmission Network Expansion Planning Using LSHADE-SPACMA
    Refaat, Mohamed M.
    Aleem, Shady H. E. Abdel
    Atia, Yousry
    Ali, Ziad M.
    Sayed, Mahmoud M.
    APPLIED SCIENCES-BASEL, 2021, 11 (05): : 1 - 22
  • [46] Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets
    Wang, Yuanzhuo
    Li, Jingyuan
    Meng, Kun
    Lin, Chuang
    Cheng, Xueqi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 89 - 99
  • [47] A probabilistic automata-based network attack-defense game model for data security by using security service chain
    Liu, Hao
    Wang, Chong
    Wu, Zhonghai
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2025, 28 (01):
  • [48] Face mask detection using deep convolutional neural network and multi-stage image processing
    Umer, Muhammad
    Sadiq, Saima
    Alhebshi, Reemah M.
    Alsubai, Shtwai
    Al Hejaili, Abdullah
    Eshmawi, Ala' Abdulmajid
    Nappi, Michele
    Ashraf, Imran
    IMAGE AND VISION COMPUTING, 2023, 133
  • [49] Topology-Aware Network Pruning using Multi-stage Graph Embedding and Reinforcement Learning
    Yu, Sixing
    Mazaheri, Arya
    Jannesari, Ali
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
  • [50] Optimizing food ordering in a multi-stage catering supply chain network using reusable containers
    Ronzoni, M.
    Accorsi, R.
    Battarra, I
    Guidani, B.
    Manzini, R.
    Rubini, S.
    IFAC PAPERSONLINE, 2022, 55 (10): : 3196 - 3201