Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem

09/23/2021
by   Erick Galinkin, et al.
0

In cybersecurity, attackers range from brash, unsophisticated script kiddies and cybercriminals to stealthy, patient advanced persistent threats. When modeling these attackers, we can observe that they demonstrate different risk-seeking and risk-averse behaviors. This work explores how an attacker's risk seeking or risk averse behavior affects their operations against detection-optimizing defenders in an Internet of Things ecosystem. Using an evaluation framework which uses real, parametrizable malware, we develop a game that is played by a defender against attackers with a suite of malware that is parameterized to be more aggressive and more stealthy. These results are evaluated under a framework of exponential utility according to their willingness to accept risk. We find that against a defender who must choose a single strategy up front, risk-seeking attackers gain more actual utility than risk-averse attackers, particularly in cases where the defender is better equipped than the two attackers anticipate. Additionally, we empirically confirm that high-risk, high-reward scenarios are more beneficial to risk-seeking attackers like cybercriminals, while low-risk, low-reward scenarios are more beneficial to risk-averse attackers like advanced persistent threats.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/02/2022

Defending Against Advanced Persistent Threats using Game-Theory

Advanced persistent threats (APT) combine a variety of different attack ...
research
12/21/2021

What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering

The growing number of Internet of Things (IoT) devices makes it imperati...
research
03/02/2020

A First Step Towards Understanding Real-world Attacks on IoT Devices

With the rapid growth of Internet of Things (IoT) devices, it is imperat...
research
09/02/2021

The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

In this paper, we shed new light on the DNS amplification ecosystem, by ...
research
03/07/2023

EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones

As the Internet of Things (IoT) continues to evolve, smartphones have be...
research
06/27/2019

Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes

The honeynet is a promising active cyber defense mechanism. It reveals t...
research
04/13/2023

Power-seeking can be probable and predictive for trained agents

Power-seeking behavior is a key source of risk from advanced AI, but our...

Please sign up or login with your details

Forgot password? Click here to reset