{"title":"A Stochastic Network-Interdiction Model For Cyber Security","authors":"M. Ertem, V. Bier","doi":"10.1109/ISMSIT52890.2021.9604681","DOIUrl":null,"url":null,"abstract":"We propose a general defender-attacker model for security of computer networks, using attack graphs to represent the possible attacker strategies and defender options. The defender’s objective is to maximize the security of the network under a limited budget. In computer security, the attacker could be operating from the safety of a foreign country, and the cost of changing attack strategies may be quite low. To capture the ability of the attacker to launch multiple attempts, we represent the attacker’s success on each arc of the attack graph probabilistically, and formulate the resulting problem as a two- stage stochastic NI problem. We solve the resulting problem using two-stage stochastic optimization with recourse, and explore the attacker and defender strategies.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMSIT52890.2021.9604681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
We propose a general defender-attacker model for security of computer networks, using attack graphs to represent the possible attacker strategies and defender options. The defender’s objective is to maximize the security of the network under a limited budget. In computer security, the attacker could be operating from the safety of a foreign country, and the cost of changing attack strategies may be quite low. To capture the ability of the attacker to launch multiple attempts, we represent the attacker’s success on each arc of the attack graph probabilistically, and formulate the resulting problem as a two- stage stochastic NI problem. We solve the resulting problem using two-stage stochastic optimization with recourse, and explore the attacker and defender strategies.