Planning for Attacker Entrapment in Adversarial Settings

03/01/2023
by   Brittany Cates, et al.
0

In this paper, we propose a planning framework to generate a defense strategy against an attacker who is working in an environment where a defender can operate without the attacker's knowledge. The objective of the defender is to covertly guide the attacker to a trap state from which the attacker cannot achieve their goal. Further, the defender is constrained to achieve its goal within K number of steps, where K is calculated as a pessimistic lower bound within which the attacker is unlikely to suspect a threat in the environment. Such a defense strategy is highly useful in real world systems like honeypots or honeynets, where an unsuspecting attacker interacts with a simulated production system while assuming it is the actual production system. Typically, the interaction between an attacker and a defender is captured using game theoretic frameworks. Our problem formulation allows us to capture it as a much simpler infinite horizon discounted MDP, in which the optimal policy for the MDP gives the defender's strategy against the actions of the attacker. Through empirical evaluation, we show the merits of our problem formulation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/26/2022

Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment

Identifying the actual adversarial threat against a system vulnerability...
research
02/07/2020

A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks

In this paper, we study the problem of assessing the effectiveness of a ...
research
01/06/2021

A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

Honeypots are a well-studied defensive measure in network security. This...
research
05/28/2019

Manipulating a Learning Defender and Ways to Counteract

In Stackelberg security games, information about the attacker's type (i....
research
01/03/2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

This paper investigates the problem of synthesizing proactive defense sy...
research
04/01/2023

Coordinated Defense Allocation in Reach-Avoid Scenarios with Efficient Online Optimization

Deriving strategies for multiple agents under adversarial scenarios pose...
research
05/28/2019

A Parameterized Perspective on Protecting Elections

We study the parameterized complexity of the optimal defense and optimal...

Please sign up or login with your details

Forgot password? Click here to reset