首页> 外文会议>International conference on web and internet economics >Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
【24h】

Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

机译:缓解秘密攻击:针对目标和非目标秘密攻击的博弈模型

获取原文

摘要

Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more value over a longer period of time. These covert attacks come in multiple varieties, which can be categorized into two main types: targeted and non-targeted attacks. Targeted attacks include, for example, eyber-espionage, while non-targeted attacks include botnet recruitment. We are concerned with the subclass of these attacks for which detection is too costly or technically infeasible given the capabilities of a typical organization. As a result, defenders have to mitigate potential damages under a regime of incomplete information. A primary mitigation strategy is to reset potentially compromised resources to a known safe state, for example, by reinstalling computer systems, and changing passwords or cryptographic private keys. In a game-theoretic framework, we study the economically optimal mitigation strategies in the presence of targeted and non-targeted covert attacks. Our work has practical implications for the definition of security policies, in particular, for password and key renewal schedules.
机译:计算资源的攻击者越来越多地致力于使防御者看不到安全隐患,以便在更长的时间内获取更多的价值。这些秘密攻击有多种类型,可以分为两种主要类型:有针对性的攻击和无针对性的攻击。定向攻击包括例如eyber间谍活动,而非定向攻击包括僵尸网络募集。我们关注这些攻击的子类,鉴于典型组织的能力,对于这些子类而言,检测成本太高或在技术上不可行。结果,防御者必须在信息不完整的情况下减轻潜在的损害。一种主要的缓解策略是,例如,通过重新安装计算机系统以及更改密码或加密私钥,将可能被破坏的资源重置为已知的安全状态。在博弈论的框架中,我们研究了针对性和非针对性隐性攻击存在时经济上最佳的缓解策略。我们的工作对安全策略的定义具有实际意义,尤其是对于密码和密钥更新时间表。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号