[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Harnessing the Power of Deception in Attack Graph-Based Security Games

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2020)

Abstract

We study the use of deception in attack graph-based Stackelberg security games. In our setting, in addition to allocating defensive resources to protect important targets from attackers, the defender can strategically manipulate the attack graph through three main types of deceptive actions. We show that finding the optimal deception and defense strategy is at least NP-hard. We provide two techniques for efficiently solving this problem: a mixed-integer linear program for layered directed acyclic graphs (DAGs) and neural architecture search for general DAGs. We empirically demonstrate that using deception on attack graphs gives the defender a significant advantage, and the algorithms we develop scale gracefully to medium-sized problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    For space, we omit the full proof for hiding edges. We follow a similar construction.

References

  1. Abdallah, M., Naghizadeh, P., Hota, A.R., Cason, T., Bagchi, S., Sundaram, S.: Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs. IEEE Trans. Control Netw. Syst. (2020)

    Google Scholar 

  2. Achleitner, S., La Porta, T., McDaniel, P., Sugrim, S., Krishnamurthy, S.V., Chadha, R.: Cyber deception: virtual networks to defend insider reconnaissance. In: International Workshop Managing Insider security Threats (2016)

    Google Scholar 

  3. Albanese, M., Battista, E., Jajodia, S.: A deception based approach for defeating OS and service fingerprinting. In: Conference on Communications and Network Security (CNS) (2015)

    Google Scholar 

  4. Albanese, M., Battista, E., Jajodia, S.: Deceiving attackers by creating a virtual attack surface. In: Cyber Deception (2016)

    Google Scholar 

  5. Almeshekah, M., Spafford, E.: Planning and integrating deception into computer security defenses. In: New Security Paradigms Workshop (2014)

    Google Scholar 

  6. Almeshekah, M., Spafford, E.: Cyber security deception. In: Cyber Deception (2016)

    Google Scholar 

  7. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Conference on Computer and Communications Security (2002)

    Google Scholar 

  8. An, B., Ordóñez, F., Tambe, M., Shieh, E., Yang, R., Baldwin, C., et al.: A deployed quantal response-based patrol planning system for the US coast guard. Interfaces 43(5) (2013)

    Google Scholar 

  9. Anwar, A.H., Kamhoua, C., Leslie, N.: A game-theoretic framework for dynamic cyber deception in internet of battlefield things. In: International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2019)

    Google Scholar 

  10. Anwar, A.H., Kamhoua, C., Leslie, N.: Honeypot allocation over attack graphs in cyber deception games. In: International Conference on Computing, Networking and Communications (2020)

    Google Scholar 

  11. Basak, A., Kamhoua, C., Venkatesan, S., Gutierrez, M., Anwar, A.H., Kiekintveld, C.: Identifying stealthy attackers in a game theoretic framework using deception. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., Dán, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 21–32. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32430-8_2

    Chapter  Google Scholar 

  12. Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y.: HoneyGen: an automated honeytokens generator. In: IEEE ISI (2011)

    Google Scholar 

  13. Blocki, J., Christin, N., Datta, A., Procaccia, A.D., Sinha, A.: Audit games. In: International Joint Conference on Artificial Intelligence (2013)

    Google Scholar 

  14. Bondi, E., Oh, H., Xu, H., Fang, F., Dilkina, B., Tambe, M.: Broken signals in security games: coordinating patrollers and sensors in the real world. In: International Conference on Autonomous Agents and MultiAgent Systems (2019)

    Google Scholar 

  15. Car and Driver: artist shows google maps’ control over our lives by creating a fake traffic jam (2020)

    Google Scholar 

  16. Cohen, F.: The use of deception techniques: honeypots and decoys. In: Handbook Information Security, vol. 3(1) (2006)

    Google Scholar 

  17. Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: conference on Electronic commerce (2006)

    Google Scholar 

  18. Dong, C., Zhao, L.: Sensor network security defense strategy based on attack graph and improved binary PSO. Saf. Sci. 117, 81–87 (2019)

    Google Scholar 

  19. Durkota, K., Lisý, V., Bošanský, B., Kiekintveld, C.: Approximate solutions for attack graph games with imperfect information. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 228–249. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25594-1_13

    Chapter  MATH  Google Scholar 

  20. Durkota, K., Lisỳ, V., Bošanskỳ, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: International Joint Conference on Artificial Intelligence (2015)

    Google Scholar 

  21. Durkota, K., Lisỳ, V., Bošanskỳ, B., Kiekintveld, C., Pěchouček, M.: Hardening networks against strategic attackers using attack graph games. Comput. Secur. 87, 101578 (2019)

    Google Scholar 

  22. Durkota, K., Lisỳ, V., Kiekintveld, C., Bošanskỳ, B., Pěchouček, M.: Case studies of network defense with attack graph games. Intell. Syst. 31(5), 24–30 (2016)

    Google Scholar 

  23. Elsken, T., Metzen, J.H., Hutter, F.: Neural architecture search: a survey. J. Mach. Learn. Res. 20 (2019)

    Google Scholar 

  24. Erdős, P., Rényi, A.: On Random Graphs. Publicationes Mathematicae Debrecen, vol. 6 (1959)

    Google Scholar 

  25. Fang, F., et al.: PAWS-a deployed game-theoretic application to combat poaching. AI Mag. 38(1), 23–36 (2017)

    Google Scholar 

  26. Feldman, M., Naor, J., Schwartz, R.: A unified continuous greedy algorithm for submodular maximization. In: Annual Symposium on Foundations of Computer Science (2011)

    Google Scholar 

  27. Garg, N., Grosu, D.: Deception in honeynets: a game-theoretic analysis. In: Information Assurance and Security Workshop (2007)

    Google Scholar 

  28. Gurobi Optimization, LLC: Gurobi optimizer reference manual (2020)

    Google Scholar 

  29. Horák, K., Zhu, Q., Bošanskỳ, B.: Manipulating adversary’s belief: a dynamic game approach to deception by design for proactive network security. In: Conference on Decision and Game Theory for Security (2017)

    Google Scholar 

  30. IBM Security: Cost of a data breach report 2019 (2019). https://ibm.co/2CPsVnV

  31. Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Annual Computer Security Applications Conference (2006)

    Google Scholar 

  32. Instructables: how to make your bike look an ugly discouragement for thieves (2015). https://rb.gy/kb384b

  33. Jain, M., Korzhyk, D., Vaněk, O., Conitzer, V., Pěchouček, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: International Conference on Autonomous Agents and Multiagent Systems (2011)

    Google Scholar 

  34. Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54. Springer Science & Business Media (2011)

    Google Scholar 

  35. Jajodia, S., Noel, S., O’berry, B.: Topological analysis of network attack vulnerability. In: Managing Cyber Threats (2005)

    Google Scholar 

  36. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)

  37. Kreibich, C., Crowcroft, J.: Honeycomb: creating intrusion detection signatures using honeypots. Comput. Commun. Rev. 34(1), 51–56 (2004)

    Google Scholar 

  38. Kuipers, D., Fabro, M.: Control systems cyber security: defense in depth strategies. Technical report, Idaho Nat. Labo. (2006)

    Google Scholar 

  39. Liu, Y., Man, H.: Network vulnerability assessment using Bayesian networks. In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2005)

    Google Scholar 

  40. McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6–38 (1995)

    Google Scholar 

  41. Mee, P., Schuermann, T.: How a cyber attack could cause the next financial crisis (2018). https://bit.ly/3f2lOFP

  42. Mezura-Montes, E., Velázquez-Reyes, J., Coello Coello, C.A.: A comparative study of differential evolution variants for global optimization. In: Annual Conference on Genetic and Evolutionary Computation (2006)

    Google Scholar 

  43. Miah, M.S., Gutierrez, M., Veliz, O., Thakoor, O., Kiekintveld, C.: Concealing cyber-decoys using two-sided feature deception games. In: International Conference on System Sciences (2020)

    Google Scholar 

  44. Nguyen, T.H., Wright, M., Wellman, M.P., Baveja, S.: Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis. Secur. Commun. Netw. (2018)

    Google Scholar 

  45. Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Workshop on Visualization and Data Mining for Computer Security (2004)

    Google Scholar 

  46. Noel, S., Jajodia, S., O’Berry, B., Jacobs, M.: Efficient minimum-cost network hardening via exploit dependency graphs. In: Computer Security Applications Conference (2003)

    Google Scholar 

  47. Paszke, A., et al.: Pytorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems (2019)

    Google Scholar 

  48. Pawlick, J., Colbert, E., Zhu, Q.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. Comput. Surv. 52(4), 1–28 (2019)

    Google Scholar 

  49. Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms (1998)

    Google Scholar 

  50. Pita, J., Jain, M., Ordónez, F., Portway, C., Tambe, M., Western, C., et al.: Armor security for Los Angeles International Airport. In: AAAI Conference on AI (2008)

    Google Scholar 

  51. Polad, H., Puzis, R., Shapira, B.: Attack graph obfuscation. In: Dolev, S., Lodha, S. (eds.) CSCML 2017. LNCS, vol. 10332, pp. 269–287. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60080-2_20

    Chapter  Google Scholar 

  52. Schlenker, A., et al.: Deceiving cyber adversaries: a game theoretic approach. In: International Conference on Autonomous Agents and Multiagent Systems (2018)

    Google Scholar 

  53. Schneier, B.: Attack trees. Dr. Dobb’s J. 24, 12 (1999)

    Google Scholar 

  54. Shen, W., Tang, P., Zuo, S.: Automated mechanism design via neural networks. In: International Conference on Autonomous Agents and Multiagent Systems (2019)

    Google Scholar 

  55. Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: IEEE Symposium on Security and Privacy (2002)

    Google Scholar 

  56. Shi, Z.R., et al.: Learning and planning in feature deception games. arXiv preprint arXiv:1905.04833 (2019)

  57. Shi, Z.R., Tang, Z., Tran-Thanh, L., Singh, R., Fang, F.: Designing the game to play: optimizing payoff structure in security games. In: International Joint Conference on Artificial Intelligence (2018)

    Google Scholar 

  58. Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the United States. In: International Conference on Autonomous Agents and Multiagent Systems (2012)

    Google Scholar 

  59. Shieh, E., et al.: Protect in the ports of Boston, New York and beyond: experiences in deploying Stackelberg security games with quantal response. In: Handbook Computational Approaches to Counterterrorism (2013)

    Google Scholar 

  60. Stallings, W., Brown, L., Bauer, M.D., Bhattacharjee, A.K.: Computer Security: Principles and Practice (2012)

    Google Scholar 

  61. Storn, R., Price, K.: Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11(4), 341–359 (1997)

    Google Scholar 

  62. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems. Lessons Learned. Cambridge University Press, Cambridge (2011)

    Google Scholar 

  63. Thakoor, O., Tambe, M., Vayanos, P., Xu, H., Kiekintveld, C., Fang, F.: Cyber camouflage games for strategic deception. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., Dán, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 525–541. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32430-8_31

    Chapter  Google Scholar 

  64. Virtanen, P., et al.: Scipy 1.0: fundamental algorithms for scientific computing in python. Nat. Methods 17(3), 261–272 (2020)

    Google Scholar 

  65. Wright, M., Wang, Y., Wellman, M.P.: Iterated deep reinforcement learning in games: history-aware training for improved stability. In: ACM Conference on Economics and Computation (2019)

    Google Scholar 

  66. Zhuang, J., Bier, V.M.: Reasons for secrecy and deception in homeland-security resource allocation. Risk Anal. Int. J. 30(12), 1737–1743 (2010)

    Google Scholar 

Download references

Acknowledgements

This research was sponsored by the U.S. Army Combat Capabilities Development Command Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Combat Capabilities Development Command Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephanie Milani .

Editor information

Editors and Affiliations

Appendix

Appendix

We modify the DE [61] variant DE/rand/1/bin [42]. To initialize the population, we randomly choose the sequence of deceptive actions to consider. For each type, we determine the maximum number of components that can be altered (e.g., edges to add) for this individual. If allowed, we then modify the graph with randomly-selected modifications of that type. We also add a new termination condition based on the known optimal utility (0) for the defender if the defender has infinite protective and deceptive budgets. If any solution yields this utility, then we stop early and select it as the final solution. We also use a more compact solution representation: the full solution takes space \( m_e (2 |N| + 1) + |N| + 2 |E|\), where \(m_e\) indicates the maximum number of edges that can be added to the graph given \(B^d\). Each edge to be added takes space 2|N|. To indicate that an edge is to be added, we take the \({{\,\mathrm{arg\,max}\,}}\) over the effort allocated in the first N and last N slots. The resulting indices ij indicate the endpoints of the edge. If the summed effort at ij is greater than a threshold, the edge is added. We further compact the representation when the defender cannot add or hide any edges without violating constraints by removing these parts of the solution, so each strategy uses space \(|E| + |N|\).

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Milani, S. et al. (2020). Harnessing the Power of Deception in Attack Graph-Based Security Games. In: Zhu, Q., Baras, J.S., Poovendran, R., Chen, J. (eds) Decision and Game Theory for Security. GameSec 2020. Lecture Notes in Computer Science(), vol 12513. Springer, Cham. https://doi.org/10.1007/978-3-030-64793-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64793-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64792-6

  • Online ISBN: 978-3-030-64793-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics