The Critical Node Game

03/10/2023
by   Gabriele Dragotto, et al.
0

Cloud networks are the backbone of the modern distributed internet infrastructure as they provision most of the on-demand resources organizations and individuals use daily. However, any abrupt cyber-attack could disrupt the provisioning of some of the cloud resources fulfilling the needs of customers, industries, and governments. In this work, we introduce a game-theoretic model that assesses the cyber-security risk of cloud networks and informs security experts on the optimal security strategies. Our approach combines game theory, combinatorial optimization, and cyber-security and aims at minimizing the unexpected network disruptions caused by malicious cyber-attacks under uncertainty. Methodologically, our approach consists of a simultaneous and non-cooperative attacker-defender game where each player solves a combinatorial optimization problem parametrized in the variables of the other player. Practically, our approach enables security experts to (i.) assess the security posture of the cloud network, and (ii.) dynamically adapt the level of cyber-protection deployed on the network. We provide a detailed analysis of a real-world cloud network and demonstrate the efficacy of our approach through extensive computational tests.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/11/2020

Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users

Cyber hygiene measures are often recommended for strengthening an organi...
research
03/06/2023

Resource-aware Cyber Deception in Cloud-Native Environments

Cyber deception can be a valuable addition to traditional cyber defense ...
research
07/30/2021

Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating Ransomware Attacks

Ransomware is a growing threat to individuals and enterprises alike, con...
research
10/13/2022

A Game Theoretical vulnerability analysis of Adversarial Attack

In recent times deep learning has been widely used for automating variou...
research
08/13/2019

Post-Incident Audits on Cyber Insurance Discounts

We introduce a game-theoretic model to investigate the strategic interac...
research
02/05/2023

A Game-Theoretic Approach to Solving the Roman Domination Problem

The Roamn domination problem is one important combinatorial optimization...
research
12/28/2017

Learning to Customize Network Security Rules

Security is a major concern for organizations who wish to leverage cloud...

Please sign up or login with your details

Forgot password? Click here to reset