Skip to main content

2018 | OriginalPaper | Buchkapitel

Defending Against Chained Cyber-Attacks by Adversarial Agents

verfasst von : Vivin Paliath, Paulo Shakarian

Erschienen in: Guide to Vulnerability Analysis for Computer Networks and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber adversaries employ a variety of malware and exploit to attack computer systems. Despite the prevalence of markets for malware and exploit kits, existing paradigms that model such cyber-adversarial behaviour do not account for sequential application or “chaining” of attacks, that take advantage of the complex and interdependent nature of exploits and vulnerabilities. As a result, it is challenging for security professionals to develop defensive-strategies against threats of this nature. This chapter takes the first steps toward addressing this need, based on a framework that allows for the modelling of sequential cyber-attacks on computer systems, taking into account complex interdependencies between vulnerabilities and exploits. The framework identifies the overall set of capabilities gained by an attacker through the convergence of a simple fixed-point operator. We then turn our attention to the problem of determining the optimal/most effective strategy (with respect to this model) that the defender can use to block the attacker from gaining certain capabilities and find it to be an NP-complete problem. To address this complexity, we utilize an A*-based approach and develop an admissible heuristic. We provide an implementation and show through a suite of experiments using actual vulnerability data that this method performs well in practice for identifying defensive courses of action in this domain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shakarian P, Shakarian J (2016) Considerations for the development of threat prediction in the cyber domain. In: AAAI-16 workshop on artificial intelligence for cyber security Shakarian P, Shakarian J (2016) Considerations for the development of threat prediction in the cyber domain. In: AAAI-16 workshop on artificial intelligence for cyber security
2.
Zurück zum Zitat Robertson J, Diab A, Marin E, Nunes E, Paliath V, Shakarian J, Shakarian P (2016) Darknet mining and game theory for enhanced cyber threat intelligence. Cyber Def Rev 1(2) Robertson J, Diab A, Marin E, Nunes E, Paliath V, Shakarian J, Shakarian P (2016) Darknet mining and game theory for enhanced cyber threat intelligence. Cyber Def Rev 1(2)
3.
Zurück zum Zitat Robertson JJ, Paliath V, Shakarian J, Thart A, Shakarian P (2016) Data driven game theoretic cyber threat mitigation. Innov Appl Artif Intell 28 Robertson JJ, Paliath V, Shakarian J, Thart A, Shakarian P (2016) Data driven game theoretic cyber threat mitigation. Innov Appl Artif Intell 28
5.
Zurück zum Zitat Paliath V, Shakarian P (2016) Modeling cyber-attacks on industrial control systems. In: 2016 IEEE conference on intelligence and security informatics (ISI). IEEE, pp 316–318 Paliath V, Shakarian P (2016) Modeling cyber-attacks on industrial control systems. In: 2016 IEEE conference on intelligence and security informatics (ISI). IEEE, pp 316–318
6.
Zurück zum Zitat Chen TM, Sanchez-Aarnoutse JC, Buford J (2011) Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans Smart Grid 2(4):741–749 Chen TM, Sanchez-Aarnoutse JC, Buford J (2011) Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans Smart Grid 2(4):741–749
7.
Zurück zum Zitat Henry MH, Layer RM, Snow KZ, Zaret DR (2009) Evaluating the risk of cyber attacks on scada systems via petri net analysis with application to hazardous liquid loading operations. In: IEEE conference on technologies for homeland security, 2009. HST’09. IEEE, pp 607–614 Henry MH, Layer RM, Snow KZ, Zaret DR (2009) Evaluating the risk of cyber attacks on scada systems via petri net analysis with application to hazardous liquid loading operations. In: IEEE conference on technologies for homeland security, 2009. HST’09. IEEE, pp 607–614
8.
Zurück zum Zitat Paliath V, Shakarian P (2018) Modeling sequential cyber-attacks against computer systems via vulnerability dependencies (submitted) Paliath V, Shakarian P (2018) Modeling sequential cyber-attacks against computer systems via vulnerability dependencies (submitted)
9.
Zurück zum Zitat Shakarian P (2011) Stuxnet: Cyberwar revolution in military affairs. Small Wars J Shakarian P (2011) Stuxnet: Cyberwar revolution in military affairs. Small Wars J
10.
Zurück zum Zitat Karnouskos S (2011) Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011-37th annual conference on ieee industrial electronics society. IEEE, pp 4490–4494 Karnouskos S (2011) Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011-37th annual conference on ieee industrial electronics society. IEEE, pp 4490–4494
11.
Zurück zum Zitat Falliere N, Murchu LO, Chien E (2011) W32. stuxnet dossier. White paper, Symantec Corp., Security Response, vol 5 Falliere N, Murchu LO, Chien E (2011) W32. stuxnet dossier. White paper, Symantec Corp., Security Response, vol 5
12.
Zurück zum Zitat Durkota K, Lisy V, Kiekintveld C, Bosansky B (2015) Game-theoretic algorithms for optimal network security hardening using attack graphs. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 1773–1774 Durkota K, Lisy V, Kiekintveld C, Bosansky B (2015) Game-theoretic algorithms for optimal network security hardening using attack graphs. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 1773–1774
13.
Zurück zum Zitat Vaněk O, Yin Z, Jain M, Bošanskỳ B, Tambe M, Pěchouček M (2012) Game-theoretic resource allocation for malicious packet detection in computer networks. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 905–912 Vaněk O, Yin Z, Jain M, Bošanskỳ B, Tambe M, Pěchouček M (2012) Game-theoretic resource allocation for malicious packet detection in computer networks. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 905–912
14.
Zurück zum Zitat Shakarian P, Lei H, Lindelauf R (2014) Power grid defense against malicious cascading failure. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 813–820 Shakarian P, Lei H, Lindelauf R (2014) Power grid defense against malicious cascading failure. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 813–820
15.
Zurück zum Zitat Hayel Y, Zhu Q (2015) Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures. In: 2015 49th annual conference on information sciences and systems (CISS). IEEE, pp 1–3 Hayel Y, Zhu Q (2015) Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures. In: 2015 49th annual conference on information sciences and systems (CISS). IEEE, pp 1–3
16.
Zurück zum Zitat Marrone S, Nardone R, Tedesco A, D’Amore P, Vittorini V, Setola R, De Cillis F, Mazzocca N (2013) Vulnerability modeling and analysis for critical infrastructure protection applications. Int J Crit Infrastruct Prot 6(3):217–227 Marrone S, Nardone R, Tedesco A, D’Amore P, Vittorini V, Setola R, De Cillis F, Mazzocca N (2013) Vulnerability modeling and analysis for critical infrastructure protection applications. Int J Crit Infrastruct Prot 6(3):217–227
17.
Zurück zum Zitat Flammini F, Gaglione A, Mazzocca N, Pragliola C (2014) Detect: a novel framework for the detection of attacks to critical infrastructures. In: Safety, reliability and risk analysis: theory, methods and applications-proceedings of ESREL08, pp 105–112 Flammini F, Gaglione A, Mazzocca N, Pragliola C (2014) Detect: a novel framework for the detection of attacks to critical infrastructures. In: Safety, reliability and risk analysis: theory, methods and applications-proceedings of ESREL08, pp 105–112
18.
Zurück zum Zitat Spyridopoulos T, Maraslis K, Tryfonas T, Oikonomou G, Li S (2014) Managing cyber security risks in industrial control systems with game theory and viable system modelling. In: 2014 9th international conference on system of systems engineering (SOSE). IEEE, pp 266–271 Spyridopoulos T, Maraslis K, Tryfonas T, Oikonomou G, Li S (2014) Managing cyber security risks in industrial control systems with game theory and viable system modelling. In: 2014 9th international conference on system of systems engineering (SOSE). IEEE, pp 266–271
19.
Zurück zum Zitat Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 895–902 Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-volume 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 895–902
20.
Zurück zum Zitat Pita J, Jain M, Marecki J, Ordóñez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2008) Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems: industrial track. International Foundation for Autonomous Agents and Multiagent Systems, pp 125–132 Pita J, Jain M, Marecki J, Ordóñez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2008) Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems: industrial track. International Foundation for Autonomous Agents and Multiagent Systems, pp 125–132
21.
Zurück zum Zitat Jain M, Kardes E, Kiekintveld C, Ordónez F, Tambe M (2010) Security games with arbitrary schedules: a branch and price approach. In: AAAI Jain M, Kardes E, Kiekintveld C, Ordónez F, Tambe M (2010) Security games with arbitrary schedules: a branch and price approach. In: AAAI
22.
Zurück zum Zitat Okimoto T, Ikegai N, Inoue K, Okada H, Ribeiro T, Maruyama H (2013) Cyber security problem based on multi-objective distributed constraint optimization technique. In: 2013 43rd annual ieee/ifip conference on dependable systems and networks workshop (DSN-W). IEEE, pp 1–7 Okimoto T, Ikegai N, Inoue K, Okada H, Ribeiro T, Maruyama H (2013) Cyber security problem based on multi-objective distributed constraint optimization technique. In: 2013 43rd annual ieee/ifip conference on dependable systems and networks workshop (DSN-W). IEEE, pp 1–7
23.
Zurück zum Zitat Alpcan T, Başar T (2010) Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge Alpcan T, Başar T (2010) Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge
24.
Zurück zum Zitat Kusumastuti S, Cui J, Tambe A, John RS, A behavioral game modeling cyber attackers, defenders, and users Kusumastuti S, Cui J, Tambe A, John RS, A behavioral game modeling cyber attackers, defenders, and users
25.
Zurück zum Zitat Peterson JL (1981) Petri net theory and the modeling of systems Peterson JL (1981) Petri net theory and the modeling of systems
26.
Zurück zum Zitat Reisig W (2012) Petri nets: an introduction, vol 4. Springer, Berlin Reisig W (2012) Petri nets: an introduction, vol 4. Springer, Berlin
27.
Zurück zum Zitat Finkel A (1993) The minimal coverability graph for petri nets. Advances in petri nets 1993, pp 210–243 Finkel A (1993) The minimal coverability graph for petri nets. Advances in petri nets 1993, pp 210–243
28.
Zurück zum Zitat Okhravi H, Nicol D (2008) Evaluation of patch management strategies. Int J Comput Intell Theory Pract 3(2):109–117 Okhravi H, Nicol D (2008) Evaluation of patch management strategies. Int J Comput Intell Theory Pract 3(2):109–117
29.
Zurück zum Zitat Abraham S, Nair S (2017) Comparative analysis and patch optimization using the cyber security analytics framework. J Def Model Simulat, 1548512917705743 Abraham S, Nair S (2017) Comparative analysis and patch optimization using the cyber security analytics framework. J Def Model Simulat, 1548512917705743
30.
Zurück zum Zitat Miao L, Li S, Wang Z (2018) Optimal dissemination strategy of security patch based on differential game in social network. Wireless Pers Commun 98(1):237–249 Miao L, Li S, Wang Z (2018) Optimal dissemination strategy of security patch based on differential game in social network. Wireless Pers Commun 98(1):237–249
31.
Zurück zum Zitat Nunes E, Diab A, Gunn A, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. arXiv:1607.08583 Nunes E, Diab A, Gunn A, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. arXiv:​1607.​08583
Metadaten
Titel
Defending Against Chained Cyber-Attacks by Adversarial Agents
verfasst von
Vivin Paliath
Paulo Shakarian
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_8