Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses

verfasst von : M. L. Winterrose, K. M. Carter, N. Wagner, W. W. Streilein

Erschienen in: Advances in Cyber Security Analytics and Decision Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker–defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-day exploits into existence. Attacker response to two defender temporal platform migration scheduling policies is examined. In the first defender scheduling policy, the defender selects the active platform in each match uniformly at random from a pool of available platforms. In the second policy, the defender schedules each successive platform to maximize the diversity of the source code presented to the attacker. Adaptive attacker response strategies are modeled by finite state machine (FSM) constructs that evolve during simulated play against defender strategies via an evolutionary algorithm. It is demonstrated that the attacker learns to invest heavily in exploit creation for the platform with the least similarity to other platforms when faced with a diversity defense, while avoiding investment in exploits for this least similar platform when facing a randomization defense. Additionally, it is demonstrated that the diversity-maximizing defense is superior for shorter duration attacker–defender engagements but performs suboptimally in extended attacker–defender interactions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bastian, M., Heymann, S., & Jacomy M. (2009). Gephi: An open source software for exploring and manipulating networks. International AAAI conference on weblogs and social media, pp. 361–362. Bastian, M., Heymann, S., & Jacomy M. (2009). Gephi: An open source software for exploring and manipulating networks. International AAAI conference on weblogs and social media, pp. 361–362.
Zurück zum Zitat Carter, K. M., Okhravi, H., & Riordan, J. (2014). Quantitative analysis of active cyber defenses based on temporal platform diversity. arXiv preprint arXiv:1401.8255. Carter, K. M., Okhravi, H., & Riordan, J. (2014). Quantitative analysis of active cyber defenses based on temporal platform diversity. arXiv preprint arXiv:1401.8255.
Zurück zum Zitat Colbaugh, R., & Glass, K. (2012). Predictability-oriented defense against adaptive adversaries. Proceedings of the 2012 IEEE international conference on systems, man, and cybernetics, pp. 2721–2727. Colbaugh, R., & Glass, K. (2012). Predictability-oriented defense against adaptive adversaries. Proceedings of the 2012 IEEE international conference on systems, man, and cybernetics, pp. 2721–2727.
Zurück zum Zitat Holland, J. H. (1975). Adaptation in natural and artificial systems. Ann Arbor: The University of Michigan Press. Holland, J. H. (1975). Adaptation in natural and artificial systems. Ann Arbor: The University of Michigan Press.
Zurück zum Zitat MATLAB R2013b. (2013). The MathWorks, Inc., Natick: Massachusetts. MATLAB R2013b. (2013). The MathWorks, Inc., Natick: Massachusetts.
Zurück zum Zitat Michalewicz, Z. (1996). Genetic algorithms + data structures = evolution programs, 3E. Berlin: Springer.CrossRef Michalewicz, Z. (1996). Genetic algorithms + data structures = evolution programs, 3E. Berlin: Springer.CrossRef
Zurück zum Zitat Miller, J. H. (1996). The coevolution of automata in the repeated Prisoner’s dilemma. Journal of Economic Behavior and Organization, 29, 87–112.MathSciNetCrossRef Miller, J. H. (1996). The coevolution of automata in the repeated Prisoner’s dilemma. Journal of Economic Behavior and Organization, 29, 87–112.MathSciNetCrossRef
Zurück zum Zitat Mitchell, M. (1996). An introduction to genetic algorithms. Cambridge: MIT Press.MATH Mitchell, M. (1996). An introduction to genetic algorithms. Cambridge: MIT Press.MATH
Zurück zum Zitat Okhravi, H., Rabe, M., Mayberry, T., Hobson, T., Bigelow, D., Leonard, W., & Streilein, W. (2013). Survey of cyber moving target techniques. MIT Lincoln Laboratory Technical Report, 1166. Okhravi, H., Rabe, M., Mayberry, T., Hobson, T., Bigelow, D., Leonard, W., & Streilein, W. (2013). Survey of cyber moving target techniques. MIT Lincoln Laboratory Technical Report, 1166.
Zurück zum Zitat Okhravi, H., Hobson, T., Bigelow, D., & Streilein, W. (2014). Finding focus in the blur of moving-target techniques. IEEE Security & Privacy, 12(2), 16–26.CrossRef Okhravi, H., Hobson, T., Bigelow, D., & Streilein, W. (2014). Finding focus in the blur of moving-target techniques. IEEE Security & Privacy, 12(2), 16–26.CrossRef
Zurück zum Zitat Schleimer, S., Wilkerson, D.S., & Aiken, A. (2003). Winnowing: Local algorithms for document fingerprinting. Proceedings of the 2003 ACM SIGMOD international conference on management of data, pp. 76–85. Schleimer, S., Wilkerson, D.S., & Aiken, A. (2003). Winnowing: Local algorithms for document fingerprinting. Proceedings of the 2003 ACM SIGMOD international conference on management of data, pp. 76–85.
Zurück zum Zitat Tambe, M. (2012). Security and game theory: Algorithms, deployed systems, lessons learned. New York: Cambridge University Press.MATH Tambe, M. (2012). Security and game theory: Algorithms, deployed systems, lessons learned. New York: Cambridge University Press.MATH
Zurück zum Zitat Winterrose, M.L., & Carter, K. M. (2014). Strategic evolution of adversaries against temporal platform diversity active cyber defenses. Proceedings of the 2014 Symposium on Agent Directed Simulation. Society for Computer Simulation International, 2014. Winterrose, M.L., & Carter, K. M. (2014). Strategic evolution of adversaries against temporal platform diversity active cyber defenses. Proceedings of the 2014 Symposium on Agent Directed Simulation. Society for Computer Simulation International, 2014.
Metadaten
Titel
Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses
verfasst von
M. L. Winterrose
K. M. Carter
N. Wagner
W. W. Streilein
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-19353-9_1

Neuer Inhalt