Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs

10/13/2022
by   Lening Li, et al.
0

This paper studies the deployment of joint moving target defense (MTD) and deception against multi-stage cyberattacks. Given the system equipped with MTD that randomizes between different configurations, we investigate how to allocate a bounded number of sensors in each configuration to optimize the attack detection rate before the attacker achieves its objective. Specifically, two types of sensors are considered: intrusion detectors that are observable by the attacker and stealthy sensors that are not observable to the attacker. We propose a two-step optimization-based approach for allocating intrusion detectors and stealthy sensors: Firstly, the defender allocates intrusion detectors assuming the attacker will best respond to evade detection by intrusion detectors. Secondly, the defender will allocate stealthy sensors, given the best response attack strategy computed in the first step, to further reduce the attacker's chance of success. We illustrate the effectiveness of the proposed methods using a cyber defense example.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/07/2020

A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks

In this paper, we study the problem of assessing the effectiveness of a ...
research
01/03/2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

This paper investigates the problem of synthesizing proactive defense sy...
research
08/20/2022

Sensor Security: Current Progress, Research Challenges, and Future Roadmap

Sensors are one of the most pervasive and integral components of today's...
research
02/02/2022

Minimizing Expected Intrusion Detection Time in Adversarial Patrolling

In adversarial patrolling games, a mobile Defender strives to discover i...
research
02/18/2020

Network Theoretic Analysis of Maximum a Posteriori Detectors for Sensor Analysis and Design

In this paper we characterize the performance of a class of maximum-a-po...
research
04/17/2023

Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations

We implemented and evaluated an automated cyber defense agent. The agent...
research
10/02/2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives

We study a class of games, in which the adversary (attacker) is to satis...

Please sign up or login with your details

Forgot password? Click here to reset