A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate th...
Gespeichert in:
Veröffentlicht in: | Computers & security 2020-02, Vol.89, p.101660, Article 101660 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 101660 |
container_title | Computers & security |
container_volume | 89 |
creator | Huang, Linan Zhu, Quanyan |
description | Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies. |
doi_str_mv | 10.1016/j.cose.2019.101660 |
format | Article |
fullrecord | <record><control><sourceid>proquest_webof</sourceid><recordid>TN_cdi_webofscience_primary_000508490300001CitationCount</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404819302020</els_id><sourcerecordid>2348317568</sourcerecordid><originalsourceid>FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</originalsourceid><addsrcrecordid>eNqNkMFq3DAQhkVpoNukL9CToMfi7ciWbQV6WZa2KQTaQ3oWsjTe1ZKVthrtFr995TjkWHrSMPzfaOZj7L2AtQDRfTqsbSRc1yBunxodvGIrofq66mpQr9mq9PpKglRv2FuiA4DoO6VW7LLhbgrm6C3fmSMSN6dTisbueY78qcr-gtzhiIGQU04m487PwZ3xgTLfuIsJFh3_iYk8ZQyZP-wTmkzcB26nAVN12k_krXnkNJXEkW7Y1WgeCd89v9fs19cvD9u76v7Ht-_bzX1lm77O1dAMLdrRKTG6QQ6jkQi9M9L1rXPSoQMjpWmUamtnBoChxxacaBsJTqEVzTX7sMwtp_w-I2V9iOcUype6bqRqRN92qqTqJWVTJEo46lPyR5MmLUDPOvVBz3717Fcvfgv0cYH-4BBHsh6LhRcQAFpQ8haaUsG8iPr_9NZnk30M23gOuaCfFxSLqIvHpJ9x5xParF30_9rzLyNLp5s</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2348317568</pqid></control><display><type>article</type><title>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</title><source>Web of Science - Science Citation Index Expanded - 2020<img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" /></source><source>Access via ScienceDirect (Elsevier)</source><creator>Huang, Linan ; Zhu, Quanyan</creator><creatorcontrib>Huang, Linan ; Zhu, Quanyan</creatorcontrib><description>Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2019.101660</identifier><language>eng</language><publisher>OXFORD: Elsevier Ltd</publisher><subject>Adaptive systems ; Advanced persistent threats ; Bayesian analysis ; Computer Science ; Computer Science, Information Systems ; Cyber deception ; Cyber-physical systems ; Defense in depth ; Economic models ; Equilibrium ; Game theory ; Industrial control system security ; Iterative algorithms ; Iterative methods ; Machine learning ; Multi-stage Bayesian game ; Perfect Bayesian Nash equilibrium ; Players ; Proactive defense ; Science & Technology ; Technology ; Tennessee Eastman process</subject><ispartof>Computers & security, 2020-02, Vol.89, p.101660, Article 101660</ispartof><rights>2019 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Feb 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>74</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000508490300001</woscitedreferencesoriginalsourcerecordid><citedby>FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</citedby><cites>FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</cites><orcidid>0000-0003-1591-8749</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2019.101660$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>315,782,786,3552,27931,27932,28255,46002</link.rule.ids></links><search><creatorcontrib>Huang, Linan</creatorcontrib><creatorcontrib>Zhu, Quanyan</creatorcontrib><title>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</title><title>Computers & security</title><addtitle>COMPUT SECUR</addtitle><description>Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.</description><subject>Adaptive systems</subject><subject>Advanced persistent threats</subject><subject>Bayesian analysis</subject><subject>Computer Science</subject><subject>Computer Science, Information Systems</subject><subject>Cyber deception</subject><subject>Cyber-physical systems</subject><subject>Defense in depth</subject><subject>Economic models</subject><subject>Equilibrium</subject><subject>Game theory</subject><subject>Industrial control system security</subject><subject>Iterative algorithms</subject><subject>Iterative methods</subject><subject>Machine learning</subject><subject>Multi-stage Bayesian game</subject><subject>Perfect Bayesian Nash equilibrium</subject><subject>Players</subject><subject>Proactive defense</subject><subject>Science & Technology</subject><subject>Technology</subject><subject>Tennessee Eastman process</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AOWDO</sourceid><recordid>eNqNkMFq3DAQhkVpoNukL9CToMfi7ciWbQV6WZa2KQTaQ3oWsjTe1ZKVthrtFr995TjkWHrSMPzfaOZj7L2AtQDRfTqsbSRc1yBunxodvGIrofq66mpQr9mq9PpKglRv2FuiA4DoO6VW7LLhbgrm6C3fmSMSN6dTisbueY78qcr-gtzhiIGQU04m487PwZ3xgTLfuIsJFh3_iYk8ZQyZP-wTmkzcB26nAVN12k_krXnkNJXEkW7Y1WgeCd89v9fs19cvD9u76v7Ht-_bzX1lm77O1dAMLdrRKTG6QQ6jkQi9M9L1rXPSoQMjpWmUamtnBoChxxacaBsJTqEVzTX7sMwtp_w-I2V9iOcUype6bqRqRN92qqTqJWVTJEo46lPyR5MmLUDPOvVBz3717Fcvfgv0cYH-4BBHsh6LhRcQAFpQ8haaUsG8iPr_9NZnk30M23gOuaCfFxSLqIvHpJ9x5xParF30_9rzLyNLp5s</recordid><startdate>202002</startdate><enddate>202002</enddate><creator>Huang, Linan</creator><creator>Zhu, Quanyan</creator><general>Elsevier Ltd</general><general>Elsevier</general><general>Elsevier Sequoia S.A</general><scope>AOWDO</scope><scope>BLEPL</scope><scope>DTL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1591-8749</orcidid></search><sort><creationdate>202002</creationdate><title>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</title><author>Huang, Linan ; Zhu, Quanyan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c372t-b3b5ecfd81fdb4bfa4e07da4d75dd4ded0a44a38852dab00b7e50d15340d8ec13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Adaptive systems</topic><topic>Advanced persistent threats</topic><topic>Bayesian analysis</topic><topic>Computer Science</topic><topic>Computer Science, Information Systems</topic><topic>Cyber deception</topic><topic>Cyber-physical systems</topic><topic>Defense in depth</topic><topic>Economic models</topic><topic>Equilibrium</topic><topic>Game theory</topic><topic>Industrial control system security</topic><topic>Iterative algorithms</topic><topic>Iterative methods</topic><topic>Machine learning</topic><topic>Multi-stage Bayesian game</topic><topic>Perfect Bayesian Nash equilibrium</topic><topic>Players</topic><topic>Proactive defense</topic><topic>Science & Technology</topic><topic>Technology</topic><topic>Tennessee Eastman process</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Linan</creatorcontrib><creatorcontrib>Zhu, Quanyan</creatorcontrib><collection>Web of Science - Science Citation Index Expanded - 2020</collection><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huang, Linan</au><au>Zhu, Quanyan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems</atitle><jtitle>Computers & security</jtitle><stitle>COMPUT SECUR</stitle><date>2020-02</date><risdate>2020</risdate><volume>89</volume><spage>101660</spage><pages>101660-</pages><artnum>101660</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature. Proactive dynamic defenses provide a strategic and holistic security mechanism to increase the costs of attacks and mitigate the risks. This work proposes a dynamic game framework to model a long-term interaction between a stealthy attacker and a proactive defender. The stealthy and deceptive behaviors are captured by the multi-stage game of incomplete information, where each player has his own private information unknown to the other. Both players act strategically according to their beliefs which are formed by the multi-stage observation and learning. The perfect Bayesian Nash equilibrium provides a useful prediction of both players’ policies because no players benefit from unilateral deviations from the equilibrium. We propose an iterative algorithm to compute the perfect Bayesian Nash equilibrium and use the Tennessee Eastman process as a benchmark case study. Our numerical experiment corroborates the analytical results and provides further insights into the design of proactive defense-in-depth strategies.</abstract><cop>OXFORD</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2019.101660</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-1591-8749</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2020-02, Vol.89, p.101660, Article 101660 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_webofscience_primary_000508490300001CitationCount |
source | Web of Science - Science Citation Index Expanded - 2020<img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" />; Access via ScienceDirect (Elsevier) |
subjects | Adaptive systems Advanced persistent threats Bayesian analysis Computer Science Computer Science, Information Systems Cyber deception Cyber-physical systems Defense in depth Economic models Equilibrium Game theory Industrial control system security Iterative algorithms Iterative methods Machine learning Multi-stage Bayesian game Perfect Bayesian Nash equilibrium Players Proactive defense Science & Technology Technology Tennessee Eastman process |
title | A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-05T04%3A01%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_webof&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20dynamic%20games%20approach%20to%20proactive%20defense%20strategies%20against%20Advanced%20Persistent%20Threats%20in%20cyber-physical%20systems&rft.jtitle=Computers%20&%20security&rft.au=Huang,%20Linan&rft.date=2020-02&rft.volume=89&rft.spage=101660&rft.pages=101660-&rft.artnum=101660&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2019.101660&rft_dat=%3Cproquest_webof%3E2348317568%3C/proquest_webof%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2348317568&rft_id=info:pmid/&rft_els_id=S0167404819302020&rfr_iscdi=true |