Cargando…

Defending Against Advanced Persistent Threats Using Game-Theory

Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current syst...

Descripción completa

Detalles Bibliográficos
Autores principales: Rass, Stefan, König, Sandra, Schauer, Stefan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5207710/
https://www.ncbi.nlm.nih.gov/pubmed/28045922
http://dx.doi.org/10.1371/journal.pone.0168675
_version_ 1782490418610438144
author Rass, Stefan
König, Sandra
Schauer, Stefan
author_facet Rass, Stefan
König, Sandra
Schauer, Stefan
author_sort Rass, Stefan
collection PubMed
description Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.
format Online
Article
Text
id pubmed-5207710
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-52077102017-01-19 Defending Against Advanced Persistent Threats Using Game-Theory Rass, Stefan König, Sandra Schauer, Stefan PLoS One Research Article Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. Public Library of Science 2017-01-03 /pmc/articles/PMC5207710/ /pubmed/28045922 http://dx.doi.org/10.1371/journal.pone.0168675 Text en © 2017 Rass et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Rass, Stefan
König, Sandra
Schauer, Stefan
Defending Against Advanced Persistent Threats Using Game-Theory
title Defending Against Advanced Persistent Threats Using Game-Theory
title_full Defending Against Advanced Persistent Threats Using Game-Theory
title_fullStr Defending Against Advanced Persistent Threats Using Game-Theory
title_full_unstemmed Defending Against Advanced Persistent Threats Using Game-Theory
title_short Defending Against Advanced Persistent Threats Using Game-Theory
title_sort defending against advanced persistent threats using game-theory
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5207710/
https://www.ncbi.nlm.nih.gov/pubmed/28045922
http://dx.doi.org/10.1371/journal.pone.0168675
work_keys_str_mv AT rassstefan defendingagainstadvancedpersistentthreatsusinggametheory
AT konigsandra defendingagainstadvancedpersistentthreatsusinggametheory
AT schauerstefan defendingagainstadvancedpersistentthreatsusinggametheory