Stochastic Game Models in Cyber Security

Slides:



Advertisements
Similar presentations
Introduction to Game Theory
Advertisements

GAME THEORY.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
21-23 November, 2012, 5th IDCS, Wu Yi Shan, China Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib.
An Introduction to... Evolutionary Game Theory
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
A Game Theoretic Model of Strategic Conflict in Cyberspace Operations Research Department Naval Postgraduate School, Monterey, CA 80 th MORS 12 June, 2012.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Planning under Uncertainty
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Budhaditya Pyne BEE-IV Roll No: Jadavpur University.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
MAKING COMPLEX DEClSlONS
IIT Indore © Neminah Hubballi
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
Monte Carlo Methods Versatile methods for analyzing the behavior of some activity, plan or process that involves uncertainty.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Alpcan, T., and T. Basar (2004) “A game theoretic analysis of intrusion detection in access control systems” Proceedings of 43 rd IEEE Conference on Decision.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
Some Great Open Source Intrusion Detection Systems (IDSs)
SIEM Rotem Mesika System security engineering
Game theory basics A Game describes situations of strategic interaction, where the payoff for one agent depends on its own actions as well as on the actions.
Chapter 9 Intruders.
CompTIA Security+ Study Guide (SY0-401)
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Game Theory M.Pajhouh Niya M.Ghotbi
Intrusion Control.
Rational Choice Sociology
Introduction to Game Theory
CompTIA Security+ Study Guide (SY0-401)
NET 412 Network Security protocols
A Real-time Intrusion Detection System for UNIX
Intrusion Detection Systems (IDS)
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 10 Stochastic Game Zhu Han, Dusit Niyato, Walid Saad, and.
Chapter 9 Intruders.
Lecture 2 - SQL Injection
Intrusion Detection Systems
Equlibrium Selection in Stochastic Games
Lecture 8: Intrusion Detection
Intrusion Detection system
Autonomous Network Alerting Systems and Programmable Networks
Detection Detect the breach and protect the data. By,
Lecture 7: Intrusion Detection
Collaboration in Repeated Games
Presentation transcript:

Stochastic Game Models in Cyber Security Kandethody Ramachandran & Zheni Stefenova Department of Mathematics and Statistics University of South Florida

Who attacks our network? A cyber attack is an attack initiated from a computer against a website, computer system or individual computer (collectively, a computer) that compromises the confidentiality, integrity or availability of the computer or information stored on it. Hackers Terrorists, Criminal Groups Hacktivists Disgruntled Insiders Foreign Governments

Cyber Security and Game theory Dynamic of the new attacking strategies and vulnerability of the protection mechanisms; Not efficient enough quantitative decision framework to defend against highly organized attacks; Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. model the interactions between an omnipresent attacker and system administrators as the defender. DoS/DDoS, Brut force, SQL injection etc Example: Remote Attack “Vampires are fond of their games. But the games that They play are different than the variants that I'm familiar with. The rules were made to be bent, broken, shattered—and somebody always gets hurt. Always.”

Some practical solutions? Cyberspace’s dynamic nature must be acknowledged and addressed by policies that are equally dynamic. Game theory can provide the needed decision and control framework for intrusion detection systems (IDS) to address issues like attack modeling, analysis of possible threats, and decision on response actions

Current research classification Game Theory Cooperative Game Non-Cooperative game Static Game Dynamic game Complete and Imperfect information Incomplete and Imperfect information Non Bayesian approach Bayesian approach

Static games Static games: all players make decisions simultaneously, without having an information of the decisions that are being made by other players (imperfect information); According to the completeness of information, static games can be divided into two classes: Complete and Imperfect information: Jormokka and Carin Incomplete and Imperfect information: Liu Static Games Complete and Imperfect information Incomplete and Imperfect information Bayesian approach Non Bayesian approach

Dynamic Games  Dynamic or stochastic games: presented by Lloyd Shapley in early 1950s: a collection of normal-form games that the agents play repetitively,  played by one or more players.  Complete perfect information: Lye, Xiaolin, Nguyen. Complete imperfect information: Alpcan, Nguyen, Chen Incomplete perfect information: Chen, Patcha, Alpcan, Bloem, Basar Incomplete imperfect information: Alpcan, You, Basar Lloyd Shapley 2012 Nobel Memorial Prize in Economic Sciences  "for the theory of stable allocations and the practice of market design Dynamic Games Complete and perfect information Complete and Imperfect information Incomplete and imperfect information Incomplete and perfect information

Game Theory 2 players The action set for the attacker is 𝐴 𝐴 :={ 𝑎 1 ,… 𝑎 𝑁 𝐴 } The action set of the defender is: 𝐴 𝐷 :={ 𝑑 1 ,… 𝑑 𝑁 𝐷 } The outcome of this game is 𝑁 𝐴 𝑥 𝑁 𝐷 game matrices, where 𝐺 𝐴 stands for the attacker as a row player in the matrix and 𝐺 𝐷 stands for the defender as a column player respectively. Each entry will represent in 𝑁 𝐴 𝑥 𝑁 𝐷 the costs for the players, which they would like to minimize. If we have a zero-sum security game, we will have the following game matrix: 𝐺≔ 𝐺 𝐷 =− 𝐺 𝐴 Internet Server 1 Server 2 Server 3

Game Theory 2 players 𝑃 𝐴 (the attacker row player) maximizes its payoff, while 𝑃 𝐷 ,(the defender column player) minimizes it’s cost, based on the entries of the game matrix 𝑝 𝐴 ≔[ 𝑝 1 ,… 𝑝 𝑁 𝑎 ] is the probability distribution on attacking (action) 𝐴 𝐴 ; 𝑝 𝐷 ≔[ 𝑞 1 ,… 𝑞 𝑁 𝐷 ] is the probability distribution on defending (action) 𝐴 𝐷 ; 0≤ 𝑝 𝑖 , 𝑞 𝑖 ≤1; 𝑖 𝑝 𝑖 = 𝑖 𝑞 𝑖 =1 Nash Equilibrium solution is denoted by the pair of probability distributions (p*,q*). The pair(vA∗,vD∗) = (p*GAq*T , p*GDq*T), is the NE outcome of the security game for PA and PD, respectively, where [.]T stands for the transpose of a vector or a matrix.

Stochastic Games Stochastic Games A 2-person stochastic game with finite state action spaces is given by Where S-finite state space, A(s) & B(s) are finite set of admissible actions in state s for player 1 & player 2, respectively, p=p(s,a,b,z) is the transition probability from state s to z with actions a & b. is the reward function. is the discount factor. If The game is called zero-sum, otherwise general sum.

Stochastic Game Such strategies are represented by A strategy for a player is a rule for any given history Such strategies are represented by For initial state s and any strategy pair In zero-sum game, player 1 tries to maximize his profit while player 2 tries to minimize the same. upto stage n, helps to choose a randomized action to use in state at stage n. discounted reward to player with (state, action pair) is

Stochastic Games The Nash equilibrium of this game is defined to be a pair of strategies which simultaneously satisfy the following equations component-wise: The value of the game is considered as where 𝑠1 is the start state; Let 𝑉 denote the value of the game; 𝑣 𝜋 ∗ 1 𝜋 ∗ 2 1 (𝑠1) Under appropriate conditions it can be shown that a value (equilibrium) exists.

Intrusion Detection: Definition Definition. Intrusion Detection (ID) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. Attack Types Confidentiality: Unauthorized access to company secrets, resources. • Integrity: Altering system state or data (e.g. in databases) Scanning Attacks: Attacker gains more information on target system. e.g. probing ports. Denial of Service: Attacker renders the service unavailable. e.g. flooding Penetration: Attacker gains unauthorized privileges in the system. Input Validation Error: Attacker causes system to execute a malicious program by sending a specific input. e.g. Buffer overflow

Intrusion Detection Systems Information Sources ⇒ Analysis ⇒ Response • Information Sources: – Network Based (Distributed) IDSs: monitor packets – Host Based IDSs: Analyze system logs, messages on the host – Application Based: Analyze application behavior, logs • Analysis: Misuse/signature detection (e.g. specific event patterns); Anomaly (e.g. CPU utilization of a process, login count of users, data integrity). • Response: Active (change environment, e.g. password change) ; Passive (alert through alarms)

Application of Game Theory to Intrusion Detection Reconfiguration of security policies given the severity of attacks and making decisions on tradeoffs like increasing security versus increasing system overhead or decreasing efficiency. • Decisions on where to allocate or reallocate limited resources in real time for detecting significant threats to vital subsystems in a large networked system. • Modeling, development, and analysis of distributed decision and control schemes (possibly using autonomous software agents).

Intrusion Detection System SENSORS For Intrusion/Anomaly Detection Other Methods Patttern Recognition Signature Matching Neural Networks

Intrusion Detection Games [Alpcan and Basar] Afrand Agah, Sajal K. Das, Kalyan Basu, Mehran Asadi Consider a zero-sum finite Markov game model with 2 players (attacker & IDS (Intrusion detection system)) Action space of the attacker is defined as (represents various attack types) IDS’s action space is (passive actions (such as setting an alert) and active actions (like gathering further information) In this stochastic system, players are assumed to interact.

Intrusion Detection Games The output of the sensor network is captured by a finite number of environment states Each state may represent detection of a specific type of attack or correspond to “no detection” The sensor network is modeled as a finite state Markov chain. Probability of the sensor network’s output being in a specific state is given by the vector where

Intrusion Detection Games The transition probabilities between environment states are described by the transition matrix The IDS’s and attacker’s cost are (respectively) Attacker NA D NR c(D,NA,NR) R c(D,NA,R) ND c(ND,NA,R) A c(D,A,NR) c(D,A,R) c(ND,A,NR) c(ND,A,R) and Simple game Sensor Sensor IDS IDS

Intrusion Detection Games Assume that each player knows its own cost at each stage of the game. 3 different information structures are considered: full information; no information about sensor network characteristics (transition probabilities, M), and only information about own costs, past actions, and past states

Intrusion Detection Games (i) In the full information case each player knows everything about the sensor network as well as the preferences and past actions of its opponent. Players may utilize well-known MDP(Markov decision process) methods such as value iteration to calculate their own optimal mixed strategy solutions to the zero-sum game. (ii) In this case, the attacker can calculate its optimal strategy online (i.e. while playing the game) using a technique called minimax-Q learning. (iii) In this situation where a player only observes the sensor network’s output and keeps track of its own actions and costs. In this third case, we study single agent “naive” Q-learning (ignoring the other player’s actions) as a possible approach. Note: Calculating an optimal strategy for this zero-sum Markov game under extremely limited information continues to be an interesting research question.

Some Other Forms of Games Flipit game (ALAN NOCHENSON and JENS GROSSKLAGS, Ari Juels,… ) Data fusion approach (Dan Shen, Genshe Chen, Jose B Cruz, Jr., Leonard Haynes, Martin Kruger, and Erik Blasch) Game theoretic decision support (Yoav Freund, Robert E Schapire) Simulation Game for Computer Security (Michael L. Valenzuela, and Jerzy W. Rozenblit) Cooperative game theory for security warning schemes

Key References A. Agah, S. Das, K. Basu, and M. Asadi, “Intrusion detection in sensor networks: A non-cooperative game approach,” in 3rd IEEE International Symposium on Network Computing and Applications, (NCA 2004), Boston, MA, August 2004, pp. 343–346. Tansu Alpcan, and Tamer Basar, An Intrusion Detection Game with Limited Observations, http://alpcan.org/tansu/papers/isdg06.pdf Tansu Alpcan, and Tamer Basar, Network Security A decision and game-theoretic Approach, Cambridge University press, 2011. Ibidunmoye EO, Alese BK, and Ogundele OS, A Game-theoretic Scenario for Modelling the Attacker- Defender Interaction, J Comput Eng Inf Technol 2013 D. McMorrow, Science of Cyber-Security, MITRE Corporation report, 2010, http://fas.org/irp/agency/dod/jason/cyber.pdf Quanyan Zhu, Hamidou Tembine, and Tamer Basar, HYBRID LEARNING IN STOCHASTIC GAMES AND ITS APPLICATION IN NETWORK SECURITY, http://publish.illinois.edu/quanyanzhu/files/2012/10/LearningChapter.pdf

Computers More Difficult to Secure than a Car, or a House! You have to learn the rules of the game and then you have to play better than anyone else – “Albert Einstein” Computers More Difficult to Secure than a Car, or a House!