A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems

Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2020-02, Vol.89, p.101660, Article 101660
Hauptverfasser: Huang, Linan, Zhu, Quanyan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 101660
container_title Computers & security
container_volume 89
creator Huang, Linan
Zhu, Quanyan
description Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.
doi_str_mv 10.1016/j.cose.2019.101660
format Article
fullrecord <record><control><sourceid>proquest_webof</sourceid><recordid>TN_cdi_webofscience_primary_000508490300001CitationCount</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404819302020</els_id><sourcerecordid>2348317568</sourcerecordid><originalsourceid>FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</originalsourceid><addsrcrecordid>eNqNkMFq3DAQhkVpoNukL9CToMfi7ciWbQV6WZa2KQTaQ3oWsjTe1ZKVthrtFr995TjkWHrSMPzfaOZj7L2AtQDRfTqsbSRc1yBunxodvGIrofq66mpQr9mq9PpKglRv2FuiA4DoO6VW7LLhbgrm6C3fmSMSN6dTisbueY78qcr-gtzhiIGQU04m487PwZ3xgTLfuIsJFh3_iYk8ZQyZP-wTmkzcB26nAVN12k_krXnkNJXEkW7Y1WgeCd89v9fs19cvD9u76v7Ht-_bzX1lm77O1dAMLdrRKTG6QQ6jkQi9M9L1rXPSoQMjpWmUamtnBoChxxacaBsJTqEVzTX7sMwtp_w-I2V9iOcUype6bqRqRN92qqTqJWVTJEo46lPyR5MmLUDPOvVBz3717Fcvfgv0cYH-4BBHsh6LhRcQAFpQ8haaUsG8iPr_9NZnk30M23gOuaCfFxSLqIvHpJ9x5xParF30_9rzLyNLp5s</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2348317568</pqid></control><display><type>article</type><title>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</title><source>Web of Science - Science Citation Index Expanded - 2020&lt;img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" /&gt;</source><source>Access via ScienceDirect (Elsevier)</source><creator>Huang, Linan ; Zhu, Quanyan</creator><creatorcontrib>Huang, Linan ; Zhu, Quanyan</creatorcontrib><description>Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2019.101660</identifier><language>eng</language><publisher>OXFORD: Elsevier Ltd</publisher><subject>Adaptive systems ; Advanced persistent threats ; Bayesian analysis ; Computer Science ; Computer Science, Information Systems ; Cyber deception ; Cyber-physical systems ; Defense in depth ; Economic models ; Equilibrium ; Game theory ; Industrial control system security ; Iterative algorithms ; Iterative methods ; Machine learning ; Multi-stage Bayesian game ; Perfect Bayesian Nash equilibrium ; Players ; Proactive defense ; Science &amp; Technology ; Technology ; Tennessee Eastman process</subject><ispartof>Computers &amp; security, 2020-02, Vol.89, p.101660, Article 101660</ispartof><rights>2019 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Feb 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>74</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000508490300001</woscitedreferencesoriginalsourcerecordid><citedby>FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</citedby><cites>FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</cites><orcidid>0000-0003-1591-8749</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2019.101660$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>315,782,786,3552,27931,27932,28255,46002</link.rule.ids></links><search><creatorcontrib>Huang, Linan</creatorcontrib><creatorcontrib>Zhu, Quanyan</creatorcontrib><title>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</title><title>Computers &amp; security</title><addtitle>COMPUT SECUR</addtitle><description>Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.</description><subject>Adaptive systems</subject><subject>Advanced persistent threats</subject><subject>Bayesian analysis</subject><subject>Computer Science</subject><subject>Computer Science, Information Systems</subject><subject>Cyber deception</subject><subject>Cyber-physical systems</subject><subject>Defense in depth</subject><subject>Economic models</subject><subject>Equilibrium</subject><subject>Game theory</subject><subject>Industrial control system security</subject><subject>Iterative algorithms</subject><subject>Iterative methods</subject><subject>Machine learning</subject><subject>Multi-stage Bayesian game</subject><subject>Perfect Bayesian Nash equilibrium</subject><subject>Players</subject><subject>Proactive defense</subject><subject>Science &amp; Technology</subject><subject>Technology</subject><subject>Tennessee Eastman process</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AOWDO</sourceid><recordid>eNqNkMFq3DAQhkVpoNukL9CToMfi7ciWbQV6WZa2KQTaQ3oWsjTe1ZKVthrtFr995TjkWHrSMPzfaOZj7L2AtQDRfTqsbSRc1yBunxodvGIrofq66mpQr9mq9PpKglRv2FuiA4DoO6VW7LLhbgrm6C3fmSMSN6dTisbueY78qcr-gtzhiIGQU04m487PwZ3xgTLfuIsJFh3_iYk8ZQyZP-wTmkzcB26nAVN12k_krXnkNJXEkW7Y1WgeCd89v9fs19cvD9u76v7Ht-_bzX1lm77O1dAMLdrRKTG6QQ6jkQi9M9L1rXPSoQMjpWmUamtnBoChxxacaBsJTqEVzTX7sMwtp_w-I2V9iOcUype6bqRqRN92qqTqJWVTJEo46lPyR5MmLUDPOvVBz3717Fcvfgv0cYH-4BBHsh6LhRcQAFpQ8haaUsG8iPr_9NZnk30M23gOuaCfFxSLqIvHpJ9x5xParF30_9rzLyNLp5s</recordid><startdate>202002</startdate><enddate>202002</enddate><creator>Huang, Linan</creator><creator>Zhu, Quanyan</creator><general>Elsevier Ltd</general><general>Elsevier</general><general>Elsevier Sequoia S.A</general><scope>AOWDO</scope><scope>BLEPL</scope><scope>DTL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1591-8749</orcidid></search><sort><creationdate>202002</creationdate><title>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</title><author>Huang, Linan ; Zhu, Quanyan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Adaptive systems</topic><topic>Advanced persistent threats</topic><topic>Bayesian analysis</topic><topic>Computer Science</topic><topic>Computer Science, Information Systems</topic><topic>Cyber deception</topic><topic>Cyber-physical systems</topic><topic>Defense in depth</topic><topic>Economic models</topic><topic>Equilibrium</topic><topic>Game theory</topic><topic>Industrial control system security</topic><topic>Iterative algorithms</topic><topic>Iterative methods</topic><topic>Machine learning</topic><topic>Multi-stage Bayesian game</topic><topic>Perfect Bayesian Nash equilibrium</topic><topic>Players</topic><topic>Proactive defense</topic><topic>Science &amp; Technology</topic><topic>Technology</topic><topic>Tennessee Eastman process</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Linan</creatorcontrib><creatorcontrib>Zhu, Quanyan</creatorcontrib><collection>Web of Science - Science Citation Index Expanded - 2020</collection><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huang, Linan</au><au>Zhu, Quanyan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</atitle><jtitle>Computers &amp; security</jtitle><stitle>COMPUT SECUR</stitle><date>2020-02</date><risdate>2020</risdate><volume>89</volume><spage>101660</spage><pages>101660-</pages><artnum>101660</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.</abstract><cop>OXFORD</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2019.101660</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-1591-8749</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2020-02, Vol.89, p.101660, Article 101660
issn 0167-4048
1872-6208
language eng
recordid cdi_webofscience_primary_000508490300001CitationCount
source Web of Science - Science Citation Index Expanded - 2020<img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" />; Access via ScienceDirect (Elsevier)
subjects Adaptive systems
Advanced persistent threats
Bayesian analysis
Computer Science
Computer Science, Information Systems
Cyber deception
Cyber-physical systems
Defense in depth
Economic models
Equilibrium
Game theory
Industrial control system security
Iterative algorithms
Iterative methods
Machine learning
Multi-stage Bayesian game
Perfect Bayesian Nash equilibrium
Players
Proactive defense
Science & Technology
Technology
Tennessee Eastman process
title A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-05T04%3A01%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_webof&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20dynamic%20games%20approach%20to%20proactive%20defense%20strategies%20against%20Advanced%20Persistent%20Threats%20in%20cyber-physical%20systems&rft.jtitle=Computers%20&%20security&rft.au=Huang,%20Linan&rft.date=2020-02&rft.volume=89&rft.spage=101660&rft.pages=101660-&rft.artnum=101660&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2019.101660&rft_dat=%3Cproquest_webof%3E2348317568%3C/proquest_webof%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2348317568&rft_id=info:pmid/&rft_els_id=S0167404819302020&rfr_iscdi=true