Plan Interdiction Games

11/15/2018
by   Yevgeniy Vorobeychik, et al.
0

We propose a framework for cyber risk assessment and mitigation which models attackers as formal planners and defenders as interdicting such plans. We illustrate the value of plan interdiction problems by first modeling network cyber risk through the use of formal planning, and subsequently formalizing an important question of prioritizing vulnerabilities for patching in the plan interdiction framework. In particular, we show that selectively patching relatively few vulnerabilities allows a network administrator to significantly reduce exposure to cyber risk. More broadly, we have developed a number of scalable approaches for plan interdiction problems, making especially significant advances when attack plans involve uncertainty about system dynamics. However, important open problems remain, including how to effectively capture information asymmetry between the attacker and defender, how to best model dynamics in the attacker-defender interaction, and how to develop scalable algorithms for solving associated plan interdiction games.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/25/2018

Finding plans subject to stipulations on what information they divulge

Motivated by applications where privacy is important, we consider planni...
research
05/17/2022

Cyber Risk Assessment for Capital Management

Cyber risk is an omnipresent risk in the increasingly digitized world th...
research
09/29/2019

The Social and Psychological Impact of Cyber-Attacks

Cyber-attacks have become as commonplace as the Internet itself. Each ye...
research
08/30/2011

Proof System for Plan Verification under 0-Approximation Semantics

In this paper a proof system is developed for plan verification problems...
research
11/03/2021

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
research
01/25/2023

HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements

Emerging multi-robot systems rely on cooperation between humans and robo...
research
04/26/2019

Risk Assessment of Cyber Attacks on Telemetry Enabled Cardiac Implantable Electronic Devices (CIED)

Cardiac Implantable Electronic Devices (CIED) are fast becoming a fundam...

Please sign up or login with your details

Forgot password? Click here to reset