2015
DOI: 10.1145/2699907
|View full text |Cite
|
Sign up to set email alerts
|

Pareto-Optimal Adversarial Defense of Enterprise Systems

Abstract: The National Vulnerability Database (NVD) maintained by the US National Institute of Standards and Technology provides valuable information about vulnerabilities in popular software, as well as any patches available to address these vulnerabilities. Most enterprise security managers today simply patch the most dangerous vulnerabilities-an adversary can thus easily compromise an enterprise by using less important vulnerabilities to penetrate an enterprise. In this article, we capture the vulnerabilities in an e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 37 publications
0
24
0
Order By: Relevance
“…(69,70) On the same line, but from an economic perspective, other approaches consider the interplay between attacker and defender to define game-theoretic models with the goal of deriving mixed equilibria (whose outcomes are defined in terms of impacts and probabilities) leading to different risks. (66,75) However, these approaches leave the estimation of "likelihood of event" to the judgment of an expert that either directly sets probabilities of attack, or sets some parameters of the computational or game-theoretical model that derives the quantitative probabilities as a function of that input. (68) Patented methodologies often employ a mixture of system (76,77) and game-theoretic (78) approaches to evaluate overall system risk.…”
Section: Limitations Of Current Risk Assessment Methodologiesmentioning
confidence: 99%
“…(69,70) On the same line, but from an economic perspective, other approaches consider the interplay between attacker and defender to define game-theoretic models with the goal of deriving mixed equilibria (whose outcomes are defined in terms of impacts and probabilities) leading to different risks. (66,75) However, these approaches leave the estimation of "likelihood of event" to the judgment of an expert that either directly sets probabilities of attack, or sets some parameters of the computational or game-theoretical model that derives the quantitative probabilities as a function of that input. (68) Patented methodologies often employ a mixture of system (76,77) and game-theoretic (78) approaches to evaluate overall system risk.…”
Section: Limitations Of Current Risk Assessment Methodologiesmentioning
confidence: 99%
“…The Approximation Response is mainly responsible for finding strategies to improve the payoff of defenders. In this paper, the greedy algorithm is used to calculate the pure strategy for improving the payoff of defenders [49], i.e., U d (D, y) > U d (x, y). First, we prove the payoff function is a sub-modularity function, which can get a good solution utilizing the greedy algorithm.…”
Section: Approximation Responsementioning
confidence: 99%
“…Our agent model is more general than the previous ones because agents can access partial information on the target system. Furthermore, we are not interested in the optimal sequence or in the optimal strategy to select a sequence [33]. Instead, our goal is an accurate modelling of how agents acquire information on the target system, select an attack sequence and change the sequence they implement when countermeasures are deployed.…”
Section: Related Workmentioning
confidence: 99%