Optimal Network Security Hardening Using Attack Graph Games

被引:0
|
作者
Durkota, Karel [1 ]
Lisy, Viliam [1 ]
Bosansky, Branislav [2 ]
Kiekintveld, Christopher [3 ]
机构
[1] Czech Tech Univ, Agent Technol Ctr, Dept Comp Sci, FEE, Prague, Czech Republic
[2] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
[3] Univ Texas El Paso, Comp Sci Dept, El Paso, TX 79968 USA
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Preventing attacks in a computer network is the core problem in network security. We introduce a new game-theoretic model of the interaction between a network administrator who uses limited resource to harden a network and an attacker who follows a multi-stage plan to attack the network. The possible plans of the attacker are compactly represented using attack graphs, while the defender adds fake targets (honeypots) to the network to deceive the attacker. The compact representation of the attacker's strategies presents a computational challenge and finding the best response of the attacker is NP-hard. We present a solution method that first translates an attack graph into an MDP and solves it using policy search with a set of pruning techniques. We present an empirical evaluation of the model and solution algorithms, evaluating scalability, the types of solutions that are generated for realistic cases, and sensitivity analysis.
引用
收藏
页码:526 / 532
页数:7
相关论文
共 50 条
  • [41] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [42] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [43] Extending Attack Graph-Based Metrics for Enterprise Network Security Management
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 315 - 325
  • [44] Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network
    Ye Ru-jun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 317 - 324
  • [45] Simplifying Urban Network Security Games with Cut-Based Graph Contraction
    Iwashita, Hiroaki
    Ohori, Kotaro
    Anai, Hirokazu
    Iwasaki, Atsushi
    [J]. AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 205 - 213
  • [46] Toward Measuring Network Security Using Attack Graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    [J]. QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 49 - 54
  • [47] Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
    Zhang, Hangsheng
    Liu, Haitao
    Liang, Jie
    Li, Ting
    Geng, Liru
    Liu, Yinlong
    Chen, Shujuan
    [J]. 2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 724 - 729
  • [48] Signaling Security Games with Attack Planner Deception
    He, Santing
    Li, Mingchu
    Zhang, Runfa
    [J]. MATHEMATICS, 2024, 12 (16)
  • [49] Strategic Attack & Defense in Security Diffusion Games
    Waniek, Marcin
    Michalak, Tomasz P.
    Alshamsi, Aamena
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2020, 11 (01)
  • [50] Dynamic Network Security Situation Prediction based on Bayesian Attack Graph and Big Data
    Lin, Pengwen
    Chen, Yonghong
    [J]. PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 992 - 998