Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception

01/07/2022
by   Hampei Sasahara, et al.
0

This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be exploited, and the attacker's objective. On the other hand, rational attackers take deceptive strategies for misleading the defender into making inappropriate decisions. In this paper, their dynamic decision making is formulated as a stochastic signaling game. It is shown that the belief of the true scenario has a limit in a stochastic sense at an equilibrium based on martingale analysis. This fact implies that there are only two possible cases: the defender asymptotically detects the attack with a firm belief, or the attacker takes actions such that the system's behavior becomes nominal after a finite time step. Consequently, if different scenarios result in different stochastic behaviors, the Bayesian defense mechanism guarantees the system to be secure in an asymptotic manner provided that effective countermeasures are implemented. As an application of the finding, a defensive deception utilizing asymmetric recognition of vulnerabilities exploited by the attacker is analyzed. It is shown that the attacker possibly stops the attack even if the defender is unaware of the exploited vulnerabilities as long as the defender's unawareness is concealed by the defensive deception.

READ FULL TEXT
research
03/24/2021

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler's asymptoti...
research
01/24/2023

Learning Effective Strategies for Moving Target Defense with Switching Costs

Moving Target Defense (MTD) has emerged as a key technique in various se...
research
11/02/2022

Partially-Observable Security Games for Automating Attack-Defense Analysis

Network systems often contain vulnerabilities that remain unfixed in a n...
research
02/27/2019

Attack-Defense Quantification Based On Game-Theory

With the developing of the attack and defense technology, the cyber envi...
research
06/03/2023

Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games

Designing cyber defense systems to account for cognitive biases in human...
research
07/19/2022

Economics and Optimal Investment Policies of Attackers and Defenders in Cybersecurity

In our time cybersecurity has grown to be a topic of massive proportion ...
research
08/08/2014

An Evasion and Counter-Evasion Study in Malicious Websites Detection

Malicious websites are a major cyber attack vector, and effective detect...

Please sign up or login with your details

Forgot password? Click here to reset