skip to main content
research-article

Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks

Published:17 January 2019Publication History
Skip Abstract Section

Abstract

Advanced Persistent Threats (APTs) have created new security challenges for critical infrastructures due to their stealthy, dynamic, and adaptive natures. In this work, we aim to lay a game-theoretic foundation by establishing a multi-stage Bayesian game framework to capture incomplete information of deceptive APTs and their multistage multi-phase movement. The analysis of the perfect Bayesian Nash equilibrium (PBNE) enables a prediction of attacker's behaviors and a design of defensive strategies that can deter the adversaries and mitigate the security risks. A conjugate-prior method allows online computation of the belief and reduces Bayesian update into an iterative parameter update. The forwardly updated parameters are assimilated into the backward dynamic programming computation to characterize a computationally tractable and timeconsistent equilibrium solution based on the expanded state space. The Tennessee Eastman (TE) process control problem is used as a case study to demonstrate the dynamic game under the information asymmetry and show that APTs tend to be stealthy and deceptive during their transitions in the cyber layer and behave aggressively when reaching the targeted physical plant. The online update of the belief allows the defender to learn the behavior of the attacker and choose strategic defensive actions that can thwart adversarial behaviors and mitigate APTs. Numerical results illustrate the defender's tradeoff between the immediate reward and the future expectation as well as the attacker's goal to reach an advantageous system state while making the defender form a positive belief.

References

  1. BATHELT, A., RICKER, N. L., AND JELALI, M. Revision of the tennessee eastman process model. IFAC-PapersOnLine 48, 8 (2015), 309--314.Google ScholarGoogle ScholarCross RefCross Ref
  2. COPPOLINO, L., D'ANTONIO, S., ROMANO, L., AND SPAGNUOLO, G. An intrusion detection system for critical information infrastructures using wireless sensor network technologies. In Critical Infrastructure (CRIS), 2010 5th International Conference on (2010), IEEE, pp. 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  3. HARSANYI, J. C. Games with incomplete information played by bayesian players, i--iii part i. the basic model. Management science 14, 3 (1967), 159--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. HUANG, L., CHEN, J., AND ZHU, Q. A large-scale markov game approach to dynamic protection of interdependent infrastructure networks. In International Conference on Decision and Game Theory for Security (2017), Springer, pp. 357--376.Google ScholarGoogle ScholarCross RefCross Ref
  5. HUANG, L., AND ZHU, Q. Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems. In International Conference on Decision and Game Theory for Security (2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. MANSHAEI, M. H., ZHU, Q., ALPCAN, T., BACS¸AR, T., AND HUBAUX, J.-P. Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45, 3 (2013), 25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. VAN DIJK, M., JUELS, A., OPREA, A., AND RIVEST, R. L. Flipit: The game of stealthy takeover. Journal of Cryptology 26, 4 (2013), 655--713. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ZHANG, T., AND ZHU, Q. Strategic defense against deceptive civilian gps spoofing of unmanned aerial vehicles. In International Conference on Decision and Game Theory for Security (2017), Springer, pp. 213--233.Google ScholarGoogle ScholarCross RefCross Ref
  9. ZHU, Q., AND RASS, S. On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6 (2018), 13958--13971.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGMETRICS Performance Evaluation Review
      ACM SIGMETRICS Performance Evaluation Review  Volume 46, Issue 2
      September 2018
      95 pages
      ISSN:0163-5999
      DOI:10.1145/3305218
      Issue’s Table of Contents

      Copyright © 2019 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 January 2019

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader