Game Strategies in Network Security Kong-wei Lye and Jeannette M. Wing Carnegie Mellon University Pittsburgh, Pennsylvania, U.S.A.

Slides:



Advertisements
Similar presentations
Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
Advertisements

Game Theory Assignment For all of these games, P1 chooses between the columns, and P2 chooses between the rows.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
Mixed Strategies CMPT 882 Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte.
Julie Thompson MEDT 7477 Dr. Cooper Spring  Network/Wiring Diagram for Media Center  Network/Wiring Diagram for middle and high school  Report.
A short history of equilibrium John Nash and Game Theory.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Network Theory and Dynamic Systems Game Theory: Mixed Strategies
Non-cooperative Game Theory Notes by Alberto Bressan.
Game Theory Models for Network Security Carla Di Cairano-Gilfedder, BT 4 th Mathematics of Networks Workshop at QMUL London 22 nd July 2005.
IN SEARCH OF VALUE EQUILIBRIA By Christopher Kleven & Dustin Richwine xkcd.com.
Basics on Game Theory For Industrial Economics (According to Shy’s Plan)
Firewall Configuration Strategies
Models and Theory of Computation (MTC) EPFL Dirk Beyer, Jasmin Fisher, Nir Piterman Simon Kramer: Logic for cryptography Marc Schaub: Models for biological.
Lectures in Microeconomics-Charles W. Upton Game Theory.
INSTITUTO DE SISTEMAS E ROBÓTICA Minimax Value Iteration Applied to Robotic Soccer Gonçalo Neto Institute for Systems and Robotics Instituto Superior Técnico.
Outline  In-Class Experiment on a Coordination Game  Test of Equilibrium Selection I :Van Huyck, Battalio, and Beil (1990)  Test of Equilibrium Selection.
Outline MDP (brief) –Background –Learning MDP Q learning Game theory (brief) –Background Markov games (2-player) –Background –Learning Markov games Littman’s.
Correlated-Q Learning and Cyclic Equilibria in Markov games Haoqi Zhang.
Nash Q-Learning for General-Sum Stochastic Games Hu & Wellman March 6 th, 2006 CS286r Presented by Ilan Lobel.
1 Caching Game Dec. 9, 2003 Byung-Gon Chun, Marco Barreno.
A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Game Theoretic Analysis of Oligopoly lr L R 0000 L R 1 22 The Lane Selection Game Rational Play is indicated by the black arrows.
1 On the Agenda(s) of Research on Multi-Agent Learning by Yoav Shoham and Rob Powers and Trond Grenager Learning against opponents with bounded memory.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
Intermediate Microeconomics
Dynamic Games of complete information: Backward Induction and Subgame perfection - Repeated Games -
Module 11: Implementing ISA Server 2004 Enterprise Edition.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Game theory & Linear Programming Steve Gu Mar 28, 2008.
Carnegie Mellon University 10/23/2015 Survivability Analysis via Model Checking Oleg Sheyner Jeannette Wing Carnegie Mellon University.
The Science of Networks 6.1 Today’s topics Game Theory Normal-form games Dominating strategies Nash equilibria Acknowledgements Vincent Conitzer, Michael.
Modeling Reasoning in Strategic Situations Avi Pfeffer MURI Review Monday, December 17 th, 2007.
The Intranet.
Game Theory short. What a "Game" means in Game Theory. Rivalry is direct. In "Zero-Sum" games you win just what the other guy loses. Economic market games.
Designing Games for Distributed Optimization Na Li and Jason R. Marden IEEE Journal of Selected Topics in Signal Processing, Vol. 7, No. 2, pp ,
Algorithms for solving two-player normal form games
Intermediate Microeconomics Game Theory and Oligopoly.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Module 10: Windows Firewall and Caching Fundamentals.
Non-Cooperative Behavior in Wireless Networks Márk Félegyházi (EPFL) PhD. public defense July 9, 2007.
Repeated Game Modeling of Multicast Overlays Mike Afergan (MIT CSAIL/Akamai) Rahul Sami (University of Michigan) April 25, 2006.
Game Theoretic Model of Censorship Resistance Andrei Serjantov University of Cambridge Computer Laboratory.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Game theory basics A Game describes situations of strategic interaction, where the payoff for one agent depends on its own actions as well as on the actions.
Chapter 28 Game Theory.
Yuan Deng Vincent Conitzer Duke University
Microeconomics Course E
The Intranet.
Internet and Intranet.
Project BEST Game Theory.
Vincent Conitzer CPS Repeated games Vincent Conitzer
Internet and Intranet.
Game Theoretic Approaches to Attack Surface Shifting and Reduction
GAME THEORY AND APPLICATIONS
Game Strategies in Network Security
Multiagent Systems Game Theory © Manfred Huber 2018.
Definable strategies for Games and Equilibria
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 10 Stochastic Game Zhu Han, Dusit Niyato, Walid Saad, and.
Internet and Intranet.
GAME THEORY AND APPLICATIONS
老師會晚一點來,所以可能需要請各位稍待一下。謝謝各位~~^^
Vincent Conitzer Repeated games Vincent Conitzer
Internet and Intranet.
Collaboration in Repeated Games
Phase transitions to cooperation in the prisoner‘s dilemma
Vincent Conitzer CPS Repeated games Vincent Conitzer
Presentation transcript:

Game Strategies in Network Security Kong-wei Lye and Jeannette M. Wing Carnegie Mellon University Pittsburgh, Pennsylvania, U.S.A.

25 th July 2002Game Strategies in Network Security1 Network Example Public web server Private file server Private workstation Border router Attacker Firewall Internet

25 th July 2002Game Strategies in Network Security2 Motivation Results of their actions: costs and rewards state transitions in network Model of their interactions: stochastic game. Players in the network attack-defense game Attacker Administrator

25 th July 2002Game Strategies in Network Security3 Model Network state: EW FN l EW l WF l FN l NW Node states : n W, n F, n N Traffic state : t = n X = P  { f, h, n, p, s,v } a  { u, c } d  { c, i } l XY  { 0,,, 1 }

25 th July 2002Game Strategies in Network Security4 Stochastic Games xy Prob(y|x,a,b) Player 1 gets reward R 1 (x,a,b) Current state: x Player 1 takes action a Player 2 takes action b Player 2 gets reward R 2 (x,a,b) Prob(x|x,a,b)

25 th July 2002Game Strategies in Network Security5 Strategies Strategy: probability distribution over action set for each state s. Player k should take action  i at state s with probability  (s,  i )

25 th July 2002Game Strategies in Network Security6 Expected Returns Value vector: Expected discounted return for player k at state s when player 1 uses  1 and player 2 uses  2 :

25 th July 2002Game Strategies in Network Security7 Nash Equilibrium is a Nash equilibrium strategy pair if is player 1’s best response to player 2’s and vice versa.

25 th July 2002Game Strategies in Network Security8 Nash Equilibria [FV96] Jerzy Filar & Koos Vrieze. Competitive Markov Decision Processes. Springer-Verlag, New York, Zero-sum game: 1 unique Nash equilibrium General-sum game:  1 Nash equilibria Discounted general-sum stochastic games: most applicable class of games. Nonlinear program (NLP-1) [FV96]: used to compute Nash equilibria

25 th July 2002Game Strategies in Network Security9 State transitions Attack_httpd, 1.0, 10 Continue_attacking, 0.5, 0 Normal_operation,,, > Httpd_attacked,,, > Continue_ attacking, 0.5, 0 Httpd_hacked,,, >

25 th July 2002Game Strategies in Network Security10 Attack Graph Network_shut_down Shutdown_network Workstation_data_stolen_1 Capture_data Workstation_hacked Crack_workstation_ root_ password Webserver_sniffer Install_ sniffer Ftpd_hacked Continue_attacking Ftpd_attacked Attack_ftpd Normal_operation Attack Scenario Continue_ attacking Attack_ftpd Attack_httpd Deface_website_ leave Install_sniffer Continue_ attacking Normal_operation Httpd_attackedFtpd_attacked Ftpd_hacked Website_defaced Webserver_sniffer_detector  Run_DOS_virus   Crack_file_server _root_password Crack_workstation_ root_ password Capture_data Shutdown_network Capture_data Webserver_DOS_1 Webserver_DOS_2 Network_shut_down Shutdown_network Workstation_hacked Continue_attacking Webserver_sniffer Fileserver_hacked Httpd_hacked Fileserver_data_stolen_1 Workstation_data_stolen_1 Continue_attacking Install_ sniffer

25 th July 2002Game Strategies in Network Security11 Running NLP-1 Model: 18 states, 3 actions per state Matlab by The MathWorks Pentium III 600Mhz 128Mb 30 to 45 minutes per run Multiple Nash equilibria, depending on initialization conditions

25 th July 2002Game Strategies in Network Security12 Results Nash Equilibrium for example

25 th July 2002Game Strategies in Network Security13 Nash Equilibrium Excerpts State: Httpd_hacked State: Webserver_sniffer State: Webserver_DOS_1

25 th July 2002Game Strategies in Network Security14 Nash Equilibrium Excerpts States: Fileserver_hacked, Workstation_hacked State: Webserver_sniffer

25 th July 2002Game Strategies in Network Security15 Summary Related work employs zero-sum or static games –[Bel01], [Bro00], [Bur99], [HB01], [MSAH01], [Syv97]. Modeled the network security problem as general- sum stochastic game Found multiple Nash equilibria (best attack and defense strategies) for network example Knowledge of strategies useful for administrator

25 th July 2002Game Strategies in Network Security16 Future Work [SJW02] O. Sheyner, S. Jha, J. Wing. Automated generation and analysis of attack graphs. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, Scalability –Decompose large models into smaller components –Use automatic attack graph generation method by [SJW02].

25 th July 2002Game Strategies in Network Security17 Game Theory 2,20,3 3,01,1 Prisoner 1 Prisoner 2 cooperate defect The Prisoner’s Dilemma