skip to main content
10.1145/948109.948135acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Incentive-based modeling and inference of attacker intent, objectives, and strategies

Published:27 October 2003Publication History

ABSTRACT

Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad hoc and system or application specific. In this paper, we present a general incentive-based method to model AIOS and a game theoretic approach to infer AIOS. On one hand, we found that the concept of incentives can unify a large variety of attacker intents; the concept of utilities can integrate incentives and costs in such a way that attacker objectives can be practically modeled. On the other hand, we developed a game theoretic AIOS formalization which can capture the inherent inter-dependency between AIOS and defender objectives and strategies in such a way that AIOS can be automatically inferred. Finally, we use a specific case study to show how AIOS can be inferred in real world attack-defense scenarios.

References

  1. The network simulator ns-2. http://www.isi.edu/nsnam/ns/.Google ScholarGoogle Scholar
  2. H. Browne, W. A. Arbaugh, J. McHugh, and W. L. Fithen. A trend analysis of exploitations. In Proc. 2001 IEEE Symposium on Security and Privacy, pages 214--229, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Browne. C4i defensive infrastructure for survivability against multi-mode attacks. In Proc. 21st Century Military Communications - Architectures and Technologies for Information Superiority, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. Buike. Towards a game theory model of information warfare. Technical report, Airforce Institute of Technology, 1999. Master's Thesis.Google ScholarGoogle Scholar
  5. E. H. Clarke. Multipart pricing of public goods. Public Choice, 11:17--33, 1971.Google ScholarGoogle ScholarCross RefCross Ref
  6. V. Conitzer and T. Sandholm. Complexity results about nash equilibria. Technical report, Carnegie Mellon University, 2002. CMU-CS-02-135.Google ScholarGoogle Scholar
  7. F. Cuppens and A. Miege. Alert correlation in a cooperative intrusion detection framework. In Proc. IEEE Symposium on Security and Privacy, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Debar and A. Wespi. Aggregation and correlation of intrusion detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85--103. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Feigenbaum, C. Papadimitriou, R. Sami, and S. Shenker. A bgp-based mechanism for lowest-cost routing. In Proc. 21st ACM Symposium on Principles of Distributed Computing, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. M. Fink. Equilibrium in a stochastic n-person game. Journal of Science in Hiroshima University, Series A-I, (28):89--93, 1964.Google ScholarGoogle Scholar
  11. L. A. Gordon and M. P. Loeb. Using information security as a response to competitor analysis systems. Communications of the ACM, 44(9):70--75, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Groves. Incentives in teams. Econometrica, 41:617--663, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. P. Hespanha and S. Bohacek. Preliminary results in routing games. In Proc. 2001 American Control Conference, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. Nash. Equilibrium Points in n-Person Games Proceedings of the National Academy of Sciences, 36, 1950.Google ScholarGoogle Scholar
  15. J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against ddos attacks. In Proc. 2002 Network and Distributed Systems Security, 2002.Google ScholarGoogle Scholar
  16. D. Koller and B. Milch. Multi-agent influence diagrams for representing and solving games. In Proc. 17th International Joint Conference on Artificial Intelligence, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws. ACM Computing Surveys, 26(3), 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Liu, S. Jajodia, and C.D. McCollum. Intrusion confinement by isolation in information systems. Journal of Computer Security, 8(4):243--279, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T.F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12(4):405--418, June 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. K. Lye and J. M. Wing. Game strategies in network security. In Proc. 15th IEEE Computer Security Foundations Workshop, 2002.Google ScholarGoogle Scholar
  21. D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. IEEE Transactions on Software Engineering, 26(12), 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Mas-Colell, M. D. Whinston, and J. R. Green. Microeconomic Theory. Oxford University Press, 1 edition, 1995.Google ScholarGoogle Scholar
  23. J. McHugh. Intrusion and intrusion detection. International Journal of Information Security, (1):14--35, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Mesterton-Gibbons. An Introduction to Game-Theoretic Modeling. Addison-Wesley Publishing Company, 1992.Google ScholarGoogle Scholar
  25. B. Mukherjee, L. T. Heberlein, and K.N. Levitt. Network intrusion detection. IEEE Network, pages 26--41, June 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. Ning, Y. Cui, and D. S. Reeves. Constructing attack scenarios through correlation of intrusion alerts. In ACM Int'l Conf. on Computer and Communications Security, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. N. Nisan and A. Ronen. Algorithmic mechanism design. Games and Economic Behavior, 35, 2001.Google ScholarGoogle Scholar
  28. P. F. Syverson. A different look at secure distributed computation. In Proc. 10th IEEE Computer Security Foundations Workshop, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. F. Thusijsman. Optimality and Equilibria in Stochastic Games. Gentrum voor Wiskunde en Information, Amsterdam, 1992.Google ScholarGoogle Scholar
  30. W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance, 16:8--37, 1961.Google ScholarGoogle ScholarCross RefCross Ref
  31. X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. P. Wellman and W. E. Walsh. Auction protocols for decentralized scheduling. Games and Economic Behavior, 35, 2001.Google ScholarGoogle Scholar
  33. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proc. ACM Conference on Computer and Communication Security, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. In IEEE Transactions on Computer, 52(4):195--208, February 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Incentive-based modeling and inference of attacker intent, objectives, and strategies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Conferences
        CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
        October 2003
        374 pages
        ISBN:1581137389
        DOI:10.1145/948109

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader