[PDF][PDF] Optimal network security hardening using attack graph games

K Durkota, V Lisy, B Bošansky, C Kiekintveld - Proceedings of IJCAI, 2015 - nms.kcl.ac.uk
Proceedings of IJCAI, 2015nms.kcl.ac.uk
Preventing the attacks in a computer network is the core problem in network security. We
introduce a new game-theoretic model of the interaction between a network administrator
who uses limited resource to harden a network and an attacker who follows a multistage
plan to attack the network. The possible plans of the attacker are compactly represented
using attack graphs, while the defender adds fake targets (honeypots) to the network to
deceive the attacker. The compact representation of the attacker's strategies presents a …
Abstract
Preventing the attacks in a computer network is the core problem in network security. We introduce a new game-theoretic model of the interaction between a network administrator who uses limited resource to harden a network and an attacker who follows a multistage plan to attack the network. The possible plans of the attacker are compactly represented using attack graphs, while the defender adds fake targets (honeypots) to the network to deceive the attacker. The compact representation of the attacker’s strategies presents a computational challenge and finding the best response of the attacker is NP-hard. We present a solution method that first translates an attack graph into a MDP and solves it using policy search with a set of pruning techniques. We present an empirical evaluation of the model and solution algorithms, evaluating scalability, the types of solutions that are generated for realistic cases, and sensitivity analysis.
nms.kcl.ac.uk
以上显示的是最相近的搜索结果。 查看全部搜索结果