Learning Effective Strategies for Moving Target Defense with Switching Costs

01/24/2023
by   Vignesh Viswanathan, et al.
0

Moving Target Defense (MTD) has emerged as a key technique in various security applications as it takes away the attacker's ability to perform reconnaissance for exploiting a system's vulnerabilities. However, most of the existing research in the field assumes unrealistic access to information about the attacker's motivations and/or actions when developing MTD strategies. Many of the existing approaches also assume complete knowledge regarding the vulnerabilities of a system and how each of these vulnerabilities can be exploited by an attacker. In this work, we aim to create algorithms that generate effective Moving Target Defense strategies that do not rely on prior knowledge about the attackers. Our work assumes that the only way the defender receives information about its own reward is via interaction with the attacker in a repeated game setting. Depending on the amount of information that can be obtained from the interactions, we devise two different algorithms using multi-armed bandit formulation to identify efficient strategies. We then evaluate our algorithms using data mined from the National Vulnerability Database to showcase that they match the performance of the state-of-the-art techniques, despite using a lot less amount of information.

READ FULL TEXT

page 10

page 11

page 15

research
02/23/2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games

The present complexity in designing web applications makes software secu...
research
01/25/2023

Evaluating Deception and Moving Target Defense with Network Attack Simulation

In the field of network security, with the ongoing arms race between att...
research
01/07/2022

Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception

This paper addresses the question whether model knowledge can guide a de...
research
05/14/2023

Systematic Meets Unintended: Prior Knowledge Adaptive 5G Vulnerability Detection via Multi-Fuzzing

The virtualization and softwarization of 5G and NextG are critical enabl...
research
11/03/2021

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
research
04/01/2023

Coordinated Defense Allocation in Reach-Avoid Scenarios with Efficient Online Optimization

Deriving strategies for multiple agents under adversarial scenarios pose...
research
08/22/2022

An Input-Aware Mimic Defense Theory and its Practice

The current security problems in cyberspace are characterized by strong ...

Please sign up or login with your details

Forgot password? Click here to reset