Download presentation
Presentation is loading. Please wait.
Published byImogen Butler Modified over 9 years ago
1
Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
Modeling and Security Analysis of Enterprise Network Using Attack-defense Stochastic Game Petri Nets Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
2
Agenda Part I Introduction (Game Theory, Petri Net) Part II Model Part III Enterprise Network Part IV Analysis and Conclusion
3
Introduction Journal: Security and Communication Networks
Security Comm. Networks 2013 Impact Factor: 0.414 Author: Yuanzhuo Wang(王卓元)
4
Introduction Enterprise network
firewall, VPN, IDS/IPS, antivirus software, content monitoring prevent or to counteract attacks more effective
5
Introduction - ADSGN Stochastic Game Net Stochastic Petri Net ADSGN
6
Introduction - SGN Game Theory: Nash Equilibrium(NE) Limitations:
do not have enough modeling abilities to describe interaction relations existing modeling methods are nearly impossible to model the dynamic behaviors because of the complexity of state transitions the full state space can be extremely large
7
Introduction- SGN Stochastic Game Nets:
- use of the NE as part of the transition probabilities in SGN models - build player models => combine - backwards: attack and defense actions that are interrelated with one another
8
Introduction- Stochastic Petri Net
Mathematical modeling languages directed bipartite graph nodes: transitions and places transitions : events that may occur places: conditions The directed arcs describe which places are pre- and/or post conditions for which transitions occur.
9
Introduction- Stochastic Petri Net
P is a set of states, called places. P = {P1,P2,P3,P4} T is a set of transitions. T = {T1,T2} M represents the number of tokens m0 ={1,0,2,1} Transition firing rates
10
Introduction - ADSGN According to the characteristics of the network attack and defense actions suitable to investigate the complex and dynamic game-related issues in network attack
11
Agenda Part I Introduction Part II Model Part III Enterprise Network Part IV Analysis and Conclusion
12
Definition - Stochastic Game Nets
Nine-tuple vector SGN: is the action set of player k
13
Definition1 - Stochastic Game Nets
Nine-tuple vector SGN:
14
Definition - Stochastic Game Nets
Nine-tuple vector SGN:
15
Definition - Stochastic Game Nets
Each token S is assigned a reward vector h(s) = (h1(s), h2(s),. . .,hn(s)),where hk(s) is the reward of player k in token s Transition firing rates: consists of removing tokens from a subset of places and adding them to another subset
16
Definition - Stochastic Game Nets
a strategy for player k is described as a vector
17
Definition2 - Stochastic Game Nets
(p denotes the initial state of player k) An n-players game Player k’s utility is defined as:
18
Definition3 - Stochastic Game Nets
NE is a vector such that
19
Definition3 - ADSGN Players: n => 2 administrator, attacker
exist some transitions ti such that ti is no action
20
Theorem 1 - ADSGN For an ADSGN, if the two sets P and T contain finite elements, then there exists an NE under the setting of mixed strategies. P : places describe the states of the system
21
Modeling and analysis Reward values R
represent the reward gained by the player when an action is completed
22
Construction First:) Players model => combine the models
combining the places p that denote the same meanings in SGN models of different players: - case1 - case2
23
Construction – case1 Inhibition type
24
Construction – case2 Termination type
25
Utilities of players each players objective is to maximize the expected return k = 1, 2 is the initial place of strategy is the discount index of place
26
Utilities of players player k chooses an action using the probability distribution at place In order to determine the optimal defense strategy, we must find the NE
27
Calculation of the Nash Equilibrium
Continuous ACO(CACO) For each place pi, the behavior is modeled as a matrix game Gi action sets of the attacker action sets of the administrator if an attack action is chosen in place pi , the intrusion is successful and undetected the system may transfer to another place pj where the game can continue
28
Calculation of the Nash equilibrium
U(pi) to denote the expected utility at place pi
29
Calculation of the Nash equilibrium
30
Calculation of the Nash equilibrium
objective function
31
Evaluation and analysis
divide the place set into four parts, namely MTFSB: mean time to first security breach MTTSB: mean time to security breach
32
Agenda Part I Introduction Part II Model Part III Enterprise Network Part IV Analysis and Conclusion
33
Enterprise network security process control structure
34
security process control structure
Scan the weak ports (attacker) IDS detects the attack (administrator) Administrator server orders the firewall and trap node(administrator) The attacker enters the trap node(attacker) The trap node returns the false information to the attacker (administrator) obtain the evidence of the attacker (administrator)
35
security process control structure
(7) cracks a common user’s user name and password (attacker) (8) The attacker gets the competence of root by handling the database (attacker) (9) The attacker installs the sniffer (attacker) (10) The administrator server orders the firewall and antivirus server to blockade the IP of the attacker and remove the sniffer (administrator)
36
security process control structure
we have two action sets
37
security process control structure
ADSGN model is based on the following three assumptions (1) the administrator does not know whether there is an attacker or not (2) the attacker may have several objectives and strategies that the defender does not know (3) not all of the attacker’s actions can be observe by the defender
38
ADSGN Model of Enterprise Network
在此model中有六個places {p(normal), p(web server with vulnerability), p(get general permission), p(get root permission), p(sniffer installing), p(information stolen)} = {p1, p2, p3, p4, p5, p6}
39
ADSGN Model of Enterprise Network
p2: web server with vulnerability P3: get general permission a1:Scanvulnerability ; a2:CrackPassword a3:Attackdatabase ; a7:empty d1: IDSscan ; d2: Cheatattacker ; d3:Getevidence d6: empty
40
ADSGN Model of Enterprise Network
p4: get root permission P5:sniffer installing a4: Enhance permission ;a5:Installsniffer a7:empty d1:IDSscan ; d4: Blockade IP d5:Removesniffer ; d6:empty
41
ADSGN Model of Enterprise Network
p6:information stolen a6:Installsniffer ; a7:empty d1:IDSscan; d4:BlockadeIP d5: Remove sniffer ; d6: empty
42
Model-attacker
43
Model - administrator
44
Model - combine
45
Agenda Part I Introduction Part II Model Part III Enterprise Network Part IV Analysis and Conclusion (MTTSB, MTTFB, attack rate)
46
Experimental Security Analysis
47
Experimental Security Analysis
48
Experimental Security Analysis
49
Experimental Security Analysis
50
Experimental Security Analysis
51
Conclusion Inherit the advantages of Petri nets and SGN
investigate key factors of the attack and defense models, trying to find the inherent rules and patterns
52
Thanks for your attention
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.