Toward a Theory of Cyber Attacks

01/06/2019
by   Saeed Valizadeh, et al.
0

We provide a general methodology for analyzing defender-attacker based "games" in which we model such games as Markov models and introduce a capacity region to analyze how defensive and adversarial strategies impact security. Such a framework allows us to analyze under what kind of conditions we can prove statements (about an attack objective k) of the form "if the attacker has a time budget T_bud, then the probability that the attacker can reach an attack objective ≥ k is at most poly(T_bud)negl(k)". We are interested in such rigorous cryptographic security guarantees (that describe worst-case guarantees) as these shed light on the requirements of a defender's strategy for preventing more and more the progress of an attack, in terms of the "learning rate" of a defender's strategy. We explain the damage an attacker can achieve by a "containment parameter" describing the maximally reached attack objective within a specific time window.

READ FULL TEXT
research
02/27/2022

The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Games

This paper studies the problem of multi-step manipulative attacks in Sta...
research
04/16/2018

Towards Robust Monitoring of Stealthy Diffusion

In this work, we introduce and study the (α, β)-Monitoring game on netwo...
research
02/02/2022

Minimizing Expected Intrusion Detection Time in Adversarial Patrolling

In adversarial patrolling games, a mobile Defender strives to discover i...
research
09/23/2018

Security Diffusion Games

An increasing attention has been recently paid to studying the confronta...
research
08/14/2019

A note on the Uniformed Patroller Game

Patrolling Games were introduced by Alpern, Morton and Papadaki (2011) t...
research
04/12/2023

Cost-damage analysis of attack trees

Attack trees (ATs) are a widely deployed modelling technique to categori...
research
09/01/2022

On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers

Intention deception involves computing a strategy which deceives the opp...

Please sign up or login with your details

Forgot password? Click here to reset