RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Title | RRE: A Game-Theoretic Intrusion Response and Recovery Engine |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Zonouz, S.A., Khurana, H., Sanders, W.H., Yardley, T.M. |
Journal | Parallel and Distributed Systems, IEEE Transactions on |
Volume | 25 |
Pagination | 395-406 |
Date Published | Feb |
ISSN | 1045-9219 |
Keywords | ART, attack-response trees, automated response techniques, Boolean functions, Boolean logic, computer network security, Computers, decision theory, detection algorithms, Engines, fuzzy logic theory, fuzzy rule set, fuzzy set theory, fuzzy system, game-theoretic intrusion response and recovery engine strategy, game-theoretic optimization process, Games, Intrusion detection, Intrusion response systems, lower level attack consequences, Markov processes, network level game-theoretic response selection engine, network security property, network-level multiobjective response selection, network-level security metric values, networked computing systems, nonlinear inference, optimal network-level response actions, partially observable competitive Markov decision process, RRE, security, Snort alerts, stochastic games, Subspace constraints, system-level security events, trees (mathematics), two-player Stackelberg stochastic game, Uncertainty |
Abstract | Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in automated response techniques. In this paper, we propose a new approach to automated response called the response and recovery engine (RRE). Our engine employs a game-theoretic response strategy against adversaries modeled as opponents in a two-player Stackelberg stochastic game. The RRE applies attack-response trees (ART) to analyze undesired system-level security events within host computers and their countermeasures using Boolean logic to combine lower level attack consequences. In addition, the RRE accounts for uncertainties in intrusion detection alert notifications. The RRE then chooses optimal response actions by solving a partially observable competitive Markov decision process that is automatically derived from attack-response trees. To support network-level multiobjective response selection and consider possibly conflicting network security properties, we employ fuzzy logic theory to calculate the network-level security metric values, i.e., security levels of the system's current and potentially future states in each stage of the game. In particular, inputs to the network-level game-theoretic response selection engine, are first fed into the fuzzy system that is in charge of a nonlinear inference and quantitative ranking of the possible actions using its previously defined fuzzy rule set. Consequently, the optimal network-level response actions are chosen through a game-theoretic optimization process. Experimental results show that the RRE, using Snort's alerts, can protect large networks for which attack-response trees have more than 500 nodes. |
URL | https://ieeexplore.ieee.org/document/6583161 |
DOI | 10.1109/TPDS.2013.211 |
Citation Key | 6583161 |
- RRE
- Markov processes
- network level game-theoretic response selection engine
- network security property
- network-level multiobjective response selection
- network-level security metric values
- networked computing systems
- nonlinear inference
- optimal network-level response actions
- partially observable competitive Markov decision process
- lower level attack consequences
- security
- Snort alerts
- stochastic games
- Subspace constraints
- system-level security events
- trees (mathematics)
- two-player Stackelberg stochastic game
- uncertainty
- fuzzy logic theory
- attack-response trees
- automated response techniques
- Boolean functions
- Boolean logic
- computer network security
- Computers
- decision theory
- detection algorithms
- Engines
- ART
- fuzzy rule set
- fuzzy set theory
- fuzzy system
- game-theoretic intrusion response and recovery engine strategy
- game-theoretic optimization process
- Games
- Intrusion Detection
- Intrusion response systems