Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats

被引:0
|
作者
Moothedath, Shana [1 ]
Sahabandu, Dinuka [2 ]
Allen, Joey [3 ]
Bushnell, Linda [2 ]
Lee, Wenke [3 ]
Poovendran, Radha [2 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
[2] Univ Washington, Dept Elect & Comp Engn, Seattle, WA USA
[3] Georgia Inst Technol, Coll Comp, Atlanta, GA USA
基金
美国国家科学基金会;
关键词
Cyber security; Stochastic games; Neural network; Advanced persistent threats; Dynamic information flow tracking;
D O I
10.1016/j.automatica.2023.111353
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threats (APTs) are organized prolonged cyberattacks by sophisticated attackers with the intent of stealing critical information. Although APT activities are stealthy and evade detection by traditional detection tools, they interact with the system components to make progress in the attack. These interactions lead to information flows that are recorded in the form of a system log. Dynamic Information Flow Tracking (DIFT) has been shown to be an effective way to detect APTs using information flows. A DIFT-based detection mechanism dynamically performs security analysis on the information flows to detect possible attacks. However, wide range security analysis using DIFT results in a significant increase in performance overhead and high rates of false-positives and false negatives. In this paper, we model the strategic interaction between APT and DIFT as a non-cooperative stochastic game. The game unfolds on a state space constructed from an information flow graph (IFG) that is extracted from the system log. The objective of the APT in the game is to choose transitions in the IFG to find an optimal path in the IFG from an entry point of the attack to an attack target. On the other hand, the objective of DIFT is to dynamically select nodes in the IFG to perform security analysis for detecting APT. Our game model has imperfect information as the players are unaware of the actions of the opponent. We consider two scenarios of the game (i) the false-positive and false negative rates of DIFT (i.e., transition probabilities of the game) are known and (ii) the false-positive and false-negative rates are unknown. For case (i), we propose a value iteration-based algorithm and prove that the solution converges to the optimal solution (Nash equilibrium). Case (ii) translates to an incomplete information game with unknown transition probabilities. For case (ii), we propose a supervised learning-based algorithm, referred to as Hierarchical Supervised Learning (HSL) algorithm. HSL integrates a neural network, to predict the value vector of the game, with a policy iteration algorithm to compute an approximate equilibrium. We implemented our algorithms for cases (i) and (ii) on real attack datasets for nation state and ransomware attacks and validated the performance of our approach. We compared the performance of the HSL algorithm when the transition probabilities are unknown with instances with known transition probabilities and demonstrated that HSL algorithm converges to a solution close to optimal (i.e., optimal value vector) while the value vector obtained using greedy does not converge to optimal for 44.4% of the states and the mean absolute error is almost 200 times that of the HSL.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 38 条
  • [1] Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach
    Moothedath, Shana
    Sahabandu, Dinuka
    Allen, Joey
    Clark, Andrew
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (10) : 6684 - 6699
  • [2] A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats
    Moothedath, Shana
    Sahabandu, Dinuka
    Allen, Joey
    Clark, Andrew
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (12) : 5248 - 5263
  • [3] Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning
    Sahabandu, Dinuka
    Moothedath, Shana
    Allen, Joey
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 417 - 438
  • [4] DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
    Sahabandu, Dinuka
    Xiao, Baicen
    Clark, Andrew
    Lee, Sangho
    Lee, Wenke
    Poovendran, Radha
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 1136 - 1143
  • [5] TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking
    Brogi, Guillaume
    Valerie Viet Triem Tong
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [6] The Use of Machine Learning Algorithms for Detecting Advanced Persistent Threats
    Eke, Hope Nkiruka
    Petrovski, Andrei
    Ahriz, Hatem
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [7] Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification
    Siddiqui, Sana
    Khan, Muhammad Salman
    Ferens, Ken
    Kinsner, Witold
    IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 64 - 69
  • [8] Defending Against Advanced Persistent Threats Using Game-Theory
    Rass, Stefan
    Koenig, Sandra
    Schauer, Stefan
    PLOS ONE, 2017, 12 (01):
  • [9] Flow Based Analysis of Advanced Persistent Threats Detecting Targeted Attacks in Cloud Computing
    Vance, Andrew
    2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2014, : 173 - 176
  • [10] Multi-stage Dynamic Information Flow Tracking Game
    Moothedath, Shana
    Sahabandu, Dinuka
    Clark, Andrew
    Lee, Sangho
    Lee, Wenke
    Poovendran, Radha
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 80 - 101