Simulation of Attacker Defender Interaction in a Noisy Security Game

12/08/2022
by   Erick Galinkin, et al.
0

In the cybersecurity setting, defenders are often at the mercy of their detection technologies and subject to the information and experiences that individual analysts have. In order to give defenders an advantage, it is important to understand an attacker's motivation and their likely next best action. As a first step in modeling this behavior, we introduce a security game framework that simulates interplay between attackers and defenders in a noisy environment, focusing on the factors that drive decision making for attackers and defenders in the variants of the game with full knowledge and observability, knowledge of the parameters but no observability of the state (“partial knowledge”), and zero knowledge or observability (“zero knowledge”). We demonstrate the importance of making the right assumptions about attackers, given significant differences in outcomes. Furthermore, there is a measurable trade-off between false-positives and true-positives in terms of attacker outcomes, suggesting that a more false-positive prone environment may be acceptable under conditions where true-positives are also higher.

READ FULL TEXT
research
02/28/2022

On classification of strategic agents who can both game and improve

In this work, we consider classification of agents who can both game and...
research
01/08/2021

Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats

Defensive deception techniques have emerged as a promising proactive def...
research
07/28/2020

A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts

We present a large-scale characterization of attacker activity across 11...
research
09/22/2021

Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting

Honeypots are decoy systems that lure attackers by presenting them with ...
research
02/08/2018

Detection Games Under Fully Active Adversaries

We study a binary hypothesis testing problem in which a defender must de...
research
07/25/2018

Robustness to fundamental uncertainty in AGI alignment

The AGI alignment problem has a bimodal distribution of outcomes with mo...
research
02/14/2020

Did JHotDraw respect the Law of Good Style? – An exploratory deep dive into the nature of false positives of bad code smells

Developers need to make a constant effort to improve the quality of thei...

Please sign up or login with your details

Forgot password? Click here to reset