首页> 外文会议>International Conference on Web and Internet Economics >Mitigating Covert Compromises A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
【24h】

Mitigating Covert Compromises A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

机译:缓解隐蔽损害了目标和非目标隐蔽攻击的游戏 - 理论模型

获取原文

摘要

Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more value over a longer period of time. These covert attacks come in multiple varieties, which can be categorized into two main types: targeted and non-targeted attacks. Targeted attacks include, for example, cyber-espionage, while non-targeted attacks include botnet recruitment. We are concerned with the subclass of these attacks for which detection is too costly or technically infeasible given the capabilities of a typical organization. As a result, defenders have to mitigate potential damages under a regime of incomplete information. A primary mitigation strategy is to reset potentially compromised resources to a known safe state, for example, by reinstalling computer systems, and changing passwords or cryptographic private keys. In a game-theoretic framework, we study the economically optimal mitigation strategies in the presence of targeted and non-targeted covert attacks. Our work has practical implications for the definition of security policies, in particular, for password and key renewal schedules.
机译:计算资源的攻击者越来越旨在保证从防御者隐藏的安全妥协,以便在更长的时间内提取更多值。这些隐蔽攻击有多种品种,可分为两种主要类型:有针对性的和非目标攻击。目标攻击包括例如网络间谍活动,而非目标攻击则包括僵尸网络招聘。考虑到典型组织的能力,我们涉及这些攻击的子类攻击的子类,在该攻击中过于昂贵或技术上不可行。因此,捍卫者必须在不完整信息的制度下减轻潜在的损害。主要缓解策略是将可能受损资源重置为已知的安全状态,例如,通过重新安装计算机系统,以及更改密码或加密私钥。在游戏理论框架中,我们研究了有针对性和非目标隐蔽攻击的经济上最佳缓解策略。我们的工作对安全政策的定义具有实际影响,特别是用于密码和关键续订时间表。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号