Game-Theoretic Model and Experimental Investigation of Cyber Wargaming

09/28/2018
by   Edward Colbert, et al.
0

We demonstrate that game-theoretic calculations serve as a useful tool for assisting cyber wargaming teams in identifying useful strategies. We note a significant similarity between formulating cyber wargaming strategies and the methodology known in military practice as Course of Action (COA) generation. For scenarios in which the attacker must penetrate multiple layers in a defense-in-depth security configuration, an accounting of attacker and defender costs and penetration probabilities provides cost-utility payoff matrices and penetration probability matrices. These can be used as decision tools by both the defender and attacker. Inspection of the matrices allows players to deduce preferred strategies (or COAs) based on game-theoretical equilibrium solutions. The matrices also help in analyzing anticipated effects of potential human-based choices of wargame strategies and counter-strategies. We describe a mathematical game-theoretic formalism and offer detailed analysis of a table-top cyber wargame executed at the US Army Research Laboratory. Our analysis shows how game-theoretical calculations can provide an effective tool for decision-making during cyber wargames.

READ FULL TEXT

page 3

page 4

page 11

research
04/02/2018

Security of Transportation Networks: Modeling Attacker-Defender Interaction

Transportation networks are increasingly facing new security threats due...
research
03/05/2021

The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game

We consider a security game in a setting consisting of two players (an a...
research
07/20/2021

A Markov Game Model for AI-based Cyber Security Attack Mitigation

The new generation of cyber threats leverages advanced AI-aided methods,...
research
03/24/2021

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler's asymptoti...
research
11/03/2021

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communic...
research
01/24/2019

Game theoretical modelling of network/cyber security [Review paper]

Game theory is an established branch of mathematics that offers a rich s...
research
07/20/2023

Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators

Industry standard frameworks are now widespread for labeling the high-le...

Please sign up or login with your details

Forgot password? Click here to reset