DeepAI AI Chat
Log In Sign Up

Game-Theoretic Model and Experimental Investigation of Cyber Wargaming

09/28/2018
by   Edward Colbert, et al.
0

We demonstrate that game-theoretic calculations serve as a useful tool for assisting cyber wargaming teams in identifying useful strategies. We note a significant similarity between formulating cyber wargaming strategies and the methodology known in military practice as Course of Action (COA) generation. For scenarios in which the attacker must penetrate multiple layers in a defense-in-depth security configuration, an accounting of attacker and defender costs and penetration probabilities provides cost-utility payoff matrices and penetration probability matrices. These can be used as decision tools by both the defender and attacker. Inspection of the matrices allows players to deduce preferred strategies (or COAs) based on game-theoretical equilibrium solutions. The matrices also help in analyzing anticipated effects of potential human-based choices of wargame strategies and counter-strategies. We describe a mathematical game-theoretic formalism and offer detailed analysis of a table-top cyber wargame executed at the US Army Research Laboratory. Our analysis shows how game-theoretical calculations can provide an effective tool for decision-making during cyber wargames.

READ FULL TEXT

page 3

page 4

page 11

04/02/2018

Security of Transportation Networks: Modeling Attacker-Defender Interaction

Transportation networks are increasingly facing new security threats due...
03/05/2021

The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game

We consider a security game in a setting consisting of two players (an a...
07/20/2021

A Markov Game Model for AI-based Cyber Security Attack Mitigation

The new generation of cyber threats leverages advanced AI-aided methods,...
03/24/2021

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler's asymptoti...
11/03/2021

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
01/24/2019

Game theoretical modelling of network/cyber security [Review paper]

Game theory is an established branch of mathematics that offers a rich s...
01/10/2023

Chatbots in a Honeypot World

Question-and-answer agents like ChatGPT offer a novel tool for use as a ...