Cargando…
Defending Against Advanced Persistent Threats Using Game-Theory
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current syst...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5207710/ https://www.ncbi.nlm.nih.gov/pubmed/28045922 http://dx.doi.org/10.1371/journal.pone.0168675 |
_version_ | 1782490418610438144 |
---|---|
author | Rass, Stefan König, Sandra Schauer, Stefan |
author_facet | Rass, Stefan König, Sandra Schauer, Stefan |
author_sort | Rass, Stefan |
collection | PubMed |
description | Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. |
format | Online Article Text |
id | pubmed-5207710 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-52077102017-01-19 Defending Against Advanced Persistent Threats Using Game-Theory Rass, Stefan König, Sandra Schauer, Stefan PLoS One Research Article Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. Public Library of Science 2017-01-03 /pmc/articles/PMC5207710/ /pubmed/28045922 http://dx.doi.org/10.1371/journal.pone.0168675 Text en © 2017 Rass et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Rass, Stefan König, Sandra Schauer, Stefan Defending Against Advanced Persistent Threats Using Game-Theory |
title | Defending Against Advanced Persistent Threats Using Game-Theory |
title_full | Defending Against Advanced Persistent Threats Using Game-Theory |
title_fullStr | Defending Against Advanced Persistent Threats Using Game-Theory |
title_full_unstemmed | Defending Against Advanced Persistent Threats Using Game-Theory |
title_short | Defending Against Advanced Persistent Threats Using Game-Theory |
title_sort | defending against advanced persistent threats using game-theory |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5207710/ https://www.ncbi.nlm.nih.gov/pubmed/28045922 http://dx.doi.org/10.1371/journal.pone.0168675 |
work_keys_str_mv | AT rassstefan defendingagainstadvancedpersistentthreatsusinggametheory AT konigsandra defendingagainstadvancedpersistentthreatsusinggametheory AT schauerstefan defendingagainstadvancedpersistentthreatsusinggametheory |