"Stealthy attacks meets insider threats: A three-player game model"
Title | "Stealthy attacks meets insider threats: A three-player game model" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | X. Feng, Z. Zheng, P. Hu, D. Cansever, P. Mohapatra |
Conference Name | MILCOM 2015 - 2015 IEEE Military Communications Conference |
Date Published | Oct |
Publisher | IEEE |
ISBN Number | 978-1-5090-0073-9 |
Accession Number | 15666092 |
Keywords | advanced persistent threat, Computational modeling, computer security, cyber security, Face, game theory, Games, insider threats, Numerical models, pubcrawl170101, Real-time Systems, security of data, stealthy attacks, three-player attacker-defender insider game, three-player game model, two-player FlipIt game model |
Abstract | Advanced persistent threat (APT) is becoming a major threat to cyber security. As APT attacks are often launched by well funded entities that are persistent and stealthy in achieving their goals, they are highly challenging to combat in a cost-effective way. The situation becomes even worse when a sophisticated attacker is further assisted by an insider with privileged access to the inside information. Although stealthy attacks and insider threats have been considered separately in previous works, the coupling of the two is not well understood. As both types of threats are incentive driven, game theory provides a proper tool to understand the fundamental tradeoffs involved. In this paper, we propose the first three-player attacker-defender-insider game to model the strategic interactions among the three parties. Our game extends the two-player FlipIt game model for stealthy takeover by introducing an insider that can trade information to the attacker for a profit. We characterize the subgame perfect equilibria of the game with the defender as the leader and the attacker and the insider as the followers, under two different information trading processes. We make various observations and discuss approaches for achieving more efficient defense in the face of both APT and insider threats. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7357413&isnumber=7357245 |
DOI | 10.1109/MILCOM.2015.7357413 |
Citation Key | 7357413 |
- advanced persistent threat
- Computational modeling
- computer security
- cyber security
- Face
- game theory
- Games
- Insider Threats
- Numerical models
- pubcrawl170101
- real-time systems
- security of data
- stealthy attacks
- three-player attacker-defender insider game
- three-player game model
- two-player FlipIt game model