首页> 外文会议>International Conference on Decision and Game Theory for Security >Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security
【24h】

Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security

机译:操纵敌人的信念:主动网络安全设计欺骗的动态游戏方法

获取原文

摘要

Due to the sophisticated nature of current computer systems, traditional defense measures, such as firewalls, malware scanners, and intrusion detection/prevention systems, have been found inadequate. These technological systems suffer from the fact that a sophisticated attacker can study them, identify their weaknesses and thus get an advantage over the defender. To prevent this from happening a proactive cyber defense is a new defense mechanism in which we strategically engage the attacker by using cyber deception techniques, and we influence his actions by creating and reinforcing his view of the computer system. We apply the cyber deception techniques in the field of network security and study the impact of the deception on attacker's beliefs using the quantitative framework of the game theory. We account for the sequential nature of an attack and investigate how attacker's belief evolves and influences his actions. We show how the defender should manipulate this belief to prevent the attacker from achieving his goals and thus minimize the damage inflicted to the network. To design a successful defense based on cyber deception, it is crucial to employ strategic thinking and account explicitly for attacker's belief that he is being exposed to deceptive attempts. By doing so, we can make the deception more believable from the perspective of the attacker.
机译:由于目前计算机系统的复杂性,已发现传统的防御措施,如防火墙,恶意软件扫描仪和入侵检测/预防系统。这些技术系统遭受了一个先进的攻击者可以研究它们,识别他们的弱点,从而获得了对后卫的优势。为了防止这种情况发生主动网络防御是一种新的防御机制,我们通过使用网络欺骗技术战略性地从事攻击者,我们通过创造和加强他对计算机系统的观点来影响他的行为。我们在网络安全领域应用网络欺骗技术,研究利用博弈论的定量框架研究欺骗对攻击者信仰的影响。我们考虑了攻击的顺序性质,并调查攻击者的信仰如何发展和影响他的行为。我们展示了防守者如何操纵这种信念,以防止攻击者实现他的目标,从而最大限度地减少对网络造成的损害。根据网络欺骗设计成功的防御,对于采用战略思想和明确的攻击者认为他正在暴露于欺骗性的尝试是至关重要的。通过这样做,我们可以从攻击者的角度来使欺骗更可信。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号