A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception

08/07/2020
by   Abhishek N. Kulkarni, et al.
0

In this chapter, we present an approach using formal methods to synthesize reactive defense strategy in a cyber network, equipped with a set of decoy systems. We first generalize formal graphical security models–attack graphs–to incorporate defender's countermeasures in a game-theoretic model, called an attack-defend game on graph. This game captures the dynamic interactions between the defender and the attacker and their defense/attack objectives in formal logic. Then, we introduce a class of hypergames to model asymmetric information created by decoys in the attacker-defender interactions. Given qualitative security specifications in formal logic, we show that the solution concepts from hypergames and reactive synthesis in formal methods can be extended to synthesize effective dynamic defense strategy using cyber deception. The strategy takes the advantages of the misperception of the attacker to ensure security specification is satisfied, which may not be satisfiable when the information is symmetric.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/02/2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives

We study a class of games, in which the adversary (attacker) is to satis...
research
07/28/2020

Cyber Deception for Computer and Network Security: Survey and Challenges

Cyber deception has recently received increasing attentions as a promisi...
research
01/03/2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

This paper investigates the problem of synthesizing proactive defense sy...
research
11/02/2022

Partially-Observable Security Games for Automating Attack-Defense Analysis

Network systems often contain vulnerabilities that remain unfixed in a n...
research
02/17/2020

Secure-by-synthesis network with active deception and temporal logic specifications

This paper is concerned with the synthesis of strategies in network syst...
research
03/10/2022

Scalable Security Investment Methods for Voltage Stability of Power Systems

We develop investment approaches to secure electric power systems agains...
research
10/13/2018

Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System

Cyber-security is an important societal concern. Cyber-attacks have incr...

Please sign up or login with your details

Forgot password? Click here to reset