2019 International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT) 2019
DOI: 10.23919/wiopt47501.2019.9144123
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats

Abstract: Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a powerful defender uses honeynets for active defense in order to observe an attacker who has penetrated the network. Rather than immediately eject the attacker, the defender may elect to gather informa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
1
3
0
Order By: Relevance
“…Work by Pawlick et al [22] is the most similar to our work, also balancing the defender's choice between evicting an attacker versus waiting for more information. Their approach uses an infinite horizon MDP, and the defender gains information about the attacker by keeping them in honeypots.…”
Section: Related Worksupporting
confidence: 52%
“…Work by Pawlick et al [22] is the most similar to our work, also balancing the defender's choice between evicting an attacker versus waiting for more information. Their approach uses an infinite horizon MDP, and the defender gains information about the attacker by keeping them in honeypots.…”
Section: Related Worksupporting
confidence: 52%
“…Previous works [18,19] have investigated the adaptive honeypot deployment to effectively engage attackers without their notices. The authors in recent work [20] proposes a continuous-state Markov Decision Process (MDP) model and focuses on the optimal timing of the attacker ejection.…”
Section: Literaturementioning
confidence: 99%
“…The topic of defensive deception has bee surveyed in [17], which includes a taxonomy of deception mechanisms and a review of game-theoretic models. Game and decision-theoretic models for deception have been studied in various contexts [12,27], including honeypots [16,18], adversarial machine learning [25,26], moving target defense [8,28], and cyber-physical control systems [15,19,20,29]. In this work, we extend the paradigm of cyber deception to reinforcement learning and establish a theoretical foundation for understanding the impact and the fundamental limits of such adversarial behaviors.…”
Section: Related Workmentioning
confidence: 99%