Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment

10/26/2022
by   Siddhant Bhambri, et al.
0

Identifying the actual adversarial threat against a system vulnerability has been a long-standing challenge for cybersecurity research. To determine an optimal strategy for the defender, game-theoretic based decision models have been widely used to simulate the real-world attacker-defender scenarios while taking the defender's constraints into consideration. In this work, we focus on understanding human attacker behaviors in order to optimize the defender's strategy. To achieve this goal, we model attacker-defender engagements as Markov Games and search for their Bayesian Stackelberg Equilibrium. We validate our modeling approach and report our empirical findings using a Capture-The-Flag (CTF) setup, and we conduct user studies on adversaries with varying skill-levels. Our studies show that application-level deceptions are an optimal mitigation strategy against targeted attacks – outperforming classic cyber-defensive maneuvers, such as patching or blocking network requests. We use this result to further hypothesize over the attacker's behaviors when trapped in an embedded honeypot environment and present a detailed analysis of the same.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2023

Planning for Attacker Entrapment in Adversarial Settings

In this paper, we propose a planning framework to generate a defense str...
research
06/11/2023

Adversarial Reconnaissance Mitigation and Modeling

Adversarial reconnaissance is a crucial step in sophisticated cyber-atta...
research
02/08/2018

Detection Games Under Fully Active Adversaries

We study a binary hypothesis testing problem in which a defender must de...
research
06/10/2022

Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion

The security in networked systems depends greatly on recognizing and ide...
research
03/24/2021

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler's asymptoti...
research
08/04/2019

Monte-Carlo Tree Search for Simulation-based Strategy Analysis

Games are often designed to shape player behavior in a desired way; howe...
research
05/15/2017

Simulated Penetration Testing and Mitigation Analysis

Penetration testing is a well-established practical concept for the iden...

Please sign up or login with your details

Forgot password? Click here to reset