Optimal Network Security Hardening Using Attack Graph Games

Abstract

Preventing attacks in a computer network is the core problem in network security. We introduce a new game-theoretic model of the interaction between a network administrator who uses limited resource to harden a network and an attacker who follows a multi-stage plan to attack the network. The possible plans of the attacker are compactly represented using attack graphs, while the defender adds fake targets (honeypots) to the network to deceive the attacker. The compact representation of the attacker's strategies presents a computational challenge and finding the best response of the attacker is NP-hard. We present a solution method that first translates an attack graph into an MDP and solves it using policy search with a set of pruning techniques. We present an empirical evaluation of the model and solution algorithms, evaluating scalability, the types of solutions that are generated for realistic cases, and sensitivity analysis.

Cite

Text

Durkota et al. "Optimal Network Security Hardening Using Attack Graph Games." International Joint Conference on Artificial Intelligence, 2015.

Markdown

[Durkota et al. "Optimal Network Security Hardening Using Attack Graph Games." International Joint Conference on Artificial Intelligence, 2015.](https://mlanthology.org/ijcai/2015/durkota2015ijcai-optimal/)

BibTeX

@inproceedings{durkota2015ijcai-optimal,
  title     = {{Optimal Network Security Hardening Using Attack Graph Games}},
  author    = {Durkota, Karel and Lisý, Viliam and Bosanský, Branislav and Kiekintveld, Christopher},
  booktitle = {International Joint Conference on Artificial Intelligence},
  year      = {2015},
  pages     = {526-532},
  url       = {https://mlanthology.org/ijcai/2015/durkota2015ijcai-optimal/}
}