Learning Games for Defending Advanced Persistent Threats in Cyber Systems

被引:9
|
作者
Zhu, Tianqing [1 ]
Ye, Dayong [2 ,3 ]
Cheng, Zishuo [2 ,3 ]
Zhou, Wanlei [4 ]
Yu, Philip S. [5 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
[2] Univ Technol Sydney, Ctr Cyber Secur & Privacy, Ultimo, NSW 2007, Australia
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[4] City Univ Macau, Inst Data Sci, Macau, Peoples R China
[5] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
基金
美国国家科学基金会;
关键词
Advanced persistent threats (APTs); cyber system security; deep reinforcement learning; game theory; SECURITY;
D O I
10.1109/TSMC.2022.3211866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cyber system may face to multiple attackers from diverse adversaries, who usually employ sophisticated techniques to both continuously steal sensitive data and avoid being detected by defense strategies. This continuous process is typically involved in an advanced persistent threat (APT). Since the game theory is an ideal mathematical model for investigating continuous decision making of competing players, it is broadly used to research the interaction between defenders and APT attackers. Although many researchers are now using the game theory to defend against APT attacks, most of the existing solutions are limited to single-defender, single-attacker scenarios. In the real world, threats by multiple attackers are not uncommon and multiple defenders can be put in place. Therefore, to overcome the limitation of the existing solutions, we develop a multiagent deep reinforcement learning (MADRL) method with a novel sampling approach. The MADRL method allows defenders to create strategies on the fly and share their experience with other defenders. To develop this method, we create a multidefender, multiattacker game model and analyze the equilibrium of this model. The results of a series of experiments demonstrate that, with MADRL, defenders can quickly learn efficient strategies against attackers.
引用
收藏
页码:2410 / 2422
页数:13
相关论文
共 50 条
  • [41] An Exploration on Advanced Persistent Threats in Biocybersecurity and Cyberbiosecurity
    Palmer, Xavier-Lewis
    Potter, Lucas
    Karahan, Saltuk
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 532 - 535
  • [42] Surviving Advanced Persistent Threats - a Framework and Analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 445 - 454
  • [43] Combating Advanced Persistent Threats: Challenges and Solutions
    Wang, Yuntao
    Liu, Han
    Li, Zhendong
    Su, Zhou
    Li, Jiliang
    IEEE NETWORK, 2024, 38 (06): : 324 - 333
  • [44] Advanced Persistent Threat Kill Chain for Cyber-Physical Power Systems
    Presekal, Alfan
    Ştefanov, Alexandru
    Rajkumar, Vetrivel Subramaniam
    Semertzis, Ioannis
    Palensky, Peter
    IEEE Access, 2024, 12 : 177746 - 177771
  • [45] Hidden Markov models for advanced persistent threats
    Brogi G.
    Di Bernardino E.
    International Journal of Security and Networks, 2019, 14 (04) : 181 - 190
  • [46] Mitigating Exploits, Rootkits and Advanced Persistent Threats
    Durham, David
    2014 IEEE HOT CHIPS 26 SYMPOSIUM (HCS), 2014,
  • [47] Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats
    Nicho, Mathew
    McDermott, Christopher D.
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 521 - 525
  • [48] A novel approach for detecting advanced persistent threats
    Al-Saraireh, Jaafer
    Masarweh, Ala'
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) : 45 - 55
  • [49] Targeted Cyberattacks: A Superset of Advanced Persistent Threats
    Sood, Aditya K.
    Enbody, Richard J.
    IEEE SECURITY & PRIVACY, 2013, 11 (01) : 54 - 61
  • [50] The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
    Mathews, Jessica T.
    FOREIGN AFFAIRS, 2020, 99 (01) : 186 - 186