Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

01/22/2018
by   Chao Yan, et al.
0

For enhancing the privacy protections of databases, where the increasing amount of detailed personal data is stored and processed, multiple mechanisms have been developed, such as audit logging and alert triggers, which notify administrators about suspicious activities; however, the two main limitations in common are: 1) the volume of such alerts is often substantially greater than the capabilities of resource-constrained organizations, and 2) strategic attackers may disguise their actions or carefully choosing which records they touch, making incompetent the statistical detection models. For solving them, we introduce a novel approach to database auditing that explicitly accounts for adversarial behavior by 1) prioritizing the order in which types of alerts are investigated and 2) providing an upper bound on how much resource to allocate for each type. We model the interaction between a database auditor and potential attackers as a Stackelberg game in which the auditor chooses an auditing policy and attackers choose which records to target. A corresponding approach combining linear programming, column generation, and heuristic search is proposed to derive an auditing policy. For testing the policy-searching performance, a publicly available credit card application dataset are adopted, on which it shows that our methods produce high-quality mixed strategies as database audit policies, and our general approach significantly outperforms non-game-theoretic baselines.

READ FULL TEXT
research
06/20/2019

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning

Detection of malicious behavior is a fundamental problem in security. On...
research
04/11/2023

A Game-theoretic Framework for Federated Learning

In federated learning, benign participants aim to optimize a global mode...
research
08/13/2020

A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries

Cyber deception is one of the key approaches used to mislead attackers b...
research
02/21/2020

Green Security Game with Community Engagement

While game-theoretic models and algorithms have been developed to combat...
research
08/29/2021

A Policy Efficient Reduction Approach to Convex Constrained Deep Reinforcement Learning

Although well-established in general reinforcement learning (RL), value-...
research
05/10/2023

Robust multi-agent coordination via evolutionary generation of auxiliary adversarial attackers

Cooperative multi-agent reinforcement learning (CMARL) has shown to be p...
research
12/14/2017

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Cyber attacks on both databases and critical infrastructure have threate...

Please sign up or login with your details

Forgot password? Click here to reset