Visible to the public Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

TitleMulti-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Publication TypeConference Paper
Year of Publication2017
AuthorsNguyen, Thanh H., Wright, Mason, Wellman, Michael P., Baveja, Satinder
Conference NameProceedings of the 2017 Workshop on Moving Target Defense
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5176-8
Keywordsbayesian attack graph, game theoretic security, game theory, human factors, Metrics, moving target defense, pubcrawl, Resiliency, Scalability, Security Heuristics
Abstract

We study the problem of allocating limited security countermeasures to protect network data from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multi-stage interactions between a network administrator and cybercriminals, formulated as a security game. This formulation is capable of representing security environments with significant dynamics and uncertainty, and very large strategy spaces. For the game model, we propose parameterized heuristic strategies for both players. Our heuristics exploit the topological structure of the attack graphs and employ different sampling methodologies to overcome the computational complexity in determining players' actions. Given the complexity of the game, we employ a simulation-based methodology, and perform empirical game analysis over an enumerated set of these heuristic strategies. Finally, we conduct experiments based on a variety of game settings to demonstrate the advantages of our heuristics in obtaining effective defense strategies which are robust to the uncertainty of the security environment.

URLhttp://doi.acm.org/10.1145/3140549.3140562
DOI10.1145/3140549.3140562
Citation Keynguyen_multi-stage_2017