Game Theory on Attack Graph for Cyber Deception

Author(s):  
Ahmed H. Anwar ◽  
Charles Kamhoua
Keyword(s):  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Jing Liu ◽  
Yuchen Zhang ◽  
Hao Hu ◽  
Jinglei Tan ◽  
Qiang Leng ◽  
...  

In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, but the uncertainty about his adversary prevents him from taking the favorable actions. How to select the best strategy from the candidate strategies to maximize the defense payoff becomes the core issue. For this purpose, the paper innovatively designs a game theory model from the point of network survivability in combination with the attribute attack graph. The attack graph is created based on the network connectivity and known vulnerabilities using the MulVAL toolkit, which gives the full view of all the known vulnerabilities and their interdependence. Then, we use the attack graph to extract attack-defense actions, candidate attack-defense strategies, attack-defense payoffs, and network states, as well as other game modeling elements. Afterwards, the payoffs of attack-defense strategies are quantified by integrating attack-defense strength and network survivability. In addition, we input the above elements into the game model. Through repeated learning, deduction, and improvement, we can optimize the layout of defense strategies. Finally, the efficient strategy selection approach is designed on the tradeoff between defense cost and benefit. The simulation of attack-defense confrontation in small-scale LAN shows that the proposed approach is reliable and effective.


Author(s):  
Ein-Ya Gura ◽  
Michael Maschler
Keyword(s):  

Author(s):  
Zhu Han ◽  
Dusit Niyato ◽  
Walid Saad ◽  
Tamer Basar ◽  
Are Hjorungnes

1967 ◽  
Vol 12 (7) ◽  
pp. 360-361 ◽  
Author(s):  
BERNHARDT LIEBERMAN
Keyword(s):  

Nature China ◽  
2008 ◽  
Author(s):  
Felix Cheung
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document