2019
DOI: 10.1145/3305218.3305239
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks

Abstract: Advanced Persistent Threats (APTs) have created new security challenges for critical infrastructures due to their stealthy, dynamic, and adaptive natures. In this work, we aim to lay a game-theoretic foundation by establishing a multi-stage Bayesian game framework to capture incomplete information of deceptive APTs and their multistage multi-phase movement. The analysis of the perfect Bayesian Nash equilibrium (PBNE) enables a prediction of attacker's behaviors and a design of defensive strategies that can det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 63 publications
(27 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…The design of security mechanisms against APT attacks can be viewed as a multi-stage game where an attacker aims to find a path toward the control system network from its initial entry point while the network defender aims to detect and deter the attack from reaching the targeted asset [34]- [36]. If the attacker is prevented from reaching the objective or removed from the system, the system is successfully defended.…”
Section: B Game-theoretic Methodsmentioning
confidence: 99%
“…The design of security mechanisms against APT attacks can be viewed as a multi-stage game where an attacker aims to find a path toward the control system network from its initial entry point while the network defender aims to detect and deter the attack from reaching the targeted asset [34]- [36]. If the attacker is prevented from reaching the objective or removed from the system, the system is successfully defended.…”
Section: B Game-theoretic Methodsmentioning
confidence: 99%
“…Game-theoretic models are natural frameworks to capture the multistage interaction between attackers and defenders. Recently, game theory has been applied to different sets of security problems, e.g., Stackelberg and signaling games for deception and proactive defenses [21,6,22,23,24,16,25,26,27], network games for cyber-physical security [28,29,30,31,32,33,34,35,36,37], dynamic games for adaptive defense [38,39,40,41,3,42,43,44,45,46], and mechanism design theory for security [47,48,49,50,51,52,53,54,55].…”
Section: Literaturementioning
confidence: 99%
“…In this chapter, we illustrate three active defense schemes in our previous works, which are designed based on the new cyber security principle. They are defensive deception for detection and counter-deception [3,4,5] in Section 2, feedback-driven Moving Target Defense (MTD) [6] in Section 3, and adaptive honeypot engagement [7] in Section 4. All three schemes is of incomplete information, and we arrange them based on three progressive levels of information restrictions as shown in the left part of Fig.…”
Section: Introductionmentioning
confidence: 99%
“…On one hand, NoN improves the system dependability and interoperablity [29]. On the other hand, the network interdependency introduces new challenges for the system operator to maintain the NoN performance as the interconnection provides extra opportunity for the propagation of attacks from one network to another, e.g., through lateral movement in advanced persistent threat (APT) [30]. Traditional defensive strategies for networked systems are no longer sufficient in this emerging NoN framework.…”
Section: Introductionmentioning
confidence: 99%
“…Related Work: Game-theoretic approaches have been extensively adopted for resilient control of networked system and critical infrastructures [1], [7], [34], [37], [39], [40]. To analyze strategic interactions between attackers and defenders, a large number of works have focused on the security modeling and design through game-theoretic frameworks [23], [30], [35], [36], [38], [41]. Furthermore, researchers have also used game-theoretic methods to enable decentralized multi-layer network/network-of-networks design [29], [32], [42], [43].…”
Section: Introductionmentioning
confidence: 99%