Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

01/03/2023
by   Haoxiang Ma, et al.
0

This paper investigates the problem of synthesizing proactive defense systems in which the defender can allocate deceptive targets and modify the cost of actions for the attacker who aims to compromise security assets in this system. We model the interaction of the attacker and the system using a formal security model – a probabilistic attack graph. By allocating fake targets/decoys, the defender aims to distract the attacker from compromising true targets. By increasing the cost of some attack actions, the defender aims to discourage the attacker from committing to certain policies and thereby improve the defense. To optimize the defense given limited decoy resources and operational constraints, we formulate the synthesis problem as a bi-level optimization problem, while the defender designs the system, in anticipation of the attacker's best response given that the attacker has disinformation about the system due to the use of deception. Though the general formulation with bi-level optimization is NP-hard, we show that under certain assumptions, the problem can be transformed into a constrained optimization problem. We proposed an algorithm to approximately solve this constrained optimization problem using a novel incentive-design method for projected gradient ascent. We demonstrate the effectiveness of the proposed method using extensive numerical experiments.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/07/2020

A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception

In this chapter, we present an approach using formal methods to synthesi...
research
10/13/2022

Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs

This paper studies the deployment of joint moving target defense (MTD) a...
research
03/11/2021

BODAME: Bilevel Optimization for Defense Against Model Extraction

Model extraction attacks have become serious issues for service provider...
research
09/23/2018

Security Diffusion Games

An increasing attention has been recently paid to studying the confronta...
research
10/02/2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives

We study a class of games, in which the adversary (attacker) is to satis...
research
03/01/2023

Planning for Attacker Entrapment in Adversarial Settings

In this paper, we propose a planning framework to generate a defense str...
research
03/06/2019

Attack Graph Obfuscation

Before executing an attack, adversaries usually explore the victim's net...

Please sign up or login with your details

Forgot password? Click here to reset