Thimblerig: A Game-Theoretic, Adaptive, Risk-limiting Security System for Cloud Systems

被引:0
|
作者
Kumar, Gautam [1 ]
Lagesse, Brent [1 ]
机构
[1] Univ Washington Bothell, Bothell, WA 98011 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/NOMS59830.2024.10575857
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A significant portion of organizations and applications host client facing servers on cloud-based systems. As the first line of access into a system's services, these client-facing servers have a significant attack surface from network adversaries. Once compromised, these systems may be used to send spam, mine crypto, launch DDoS attacks, or used for other nefarious purposes. We propose an adaptive moving target defense that uses game theory to optimize the security and cost to the cloud system. This system leverages the fault-tolerant capabilities of cloud systems with large numbers of client facing servers and the virtualization of these client facing servers by strategically crashing random systems. As a result, an attacker who has compromised a system loses access to it and incurs the cost of having to re-compromise the system once they notice it has been lost. This approach drastically limits the amount of time that an attacker can utilize compromised systems and raises the overall investment required for that time. We have demonstrated via simulation a 90% reduction in the amount of time that an attacker has control over a compromised system for realistic scenarios based on previous data collection of live systems. This approach is agnostic to the method of compromise, so it is even effective against zero-day attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Game-Theoretic Analysis of System of Systems with Inherent Robustness Parameters
    He, Fei
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    2017 20TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2017, : 1822 - 1830
  • [22] Game-theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems
    Lin, Chung-Yi
    Tzeng, Wen-Guey
    2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, : 187 - 195
  • [23] A game-theoretic approach to model and quantify the security of cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    COMPUTERS IN INDUSTRY, 2017, 88 : 44 - 57
  • [24] Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
    Abdallah, Mustafa
    Naghizadeh, Parinaz
    Hota, Ashish R.
    Cason, Timothy
    Bagchi, Saurabh
    Sundaram, Shreyas
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1585 - 1596
  • [25] Security Resource Investment Optimization for Critical Infrastructure Systems: A Game-Theoretic Approach
    Clanin, Joe
    Bhattacharya, Sourabh
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4642 - 4647
  • [26] A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems
    Kujawski, Edouard
    SYSTEMS ENGINEERING, 2016, 19 (06) : 549 - 566
  • [27] A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System
    Cao, Zhi
    Zhang, Honggang
    Liu, Benyuan
    Sheng, Bo
    2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018,
  • [28] A Distributed Game-Theoretic Approach to IaaS Cloud Brokering
    Gasior, Jakub
    Seredynski, Franciszek
    EURO-PAR 2021: PARALLEL PROCESSING WORKSHOPS, 2022, 13098 : 81 - 90
  • [29] A Cooperative Game-Theoretic Model in Cloud Storage Auditing
    Lin, Chung-Yi
    Tzeng, Wen-Guey
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2020, 36 (01) : 127 - 143
  • [30] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,