• Corpus ID: 245827823

Asymptotic Security using Bayesian Defense Mechanisms with Application to Cyber Deception

@article{Sasahara2022AsymptoticSU,
  title={Asymptotic Security using Bayesian Defense Mechanisms with Application to Cyber Deception},
  author={Hampei Sasahara and Henrik Sandberg},
  journal={ArXiv},
  year={2022},
  volume={abs/2201.02351}
}
This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system’s behavior using models of the system’s stochastic dynamics, the vulnerability to be exploited, and the attacker’s objective. On the other hand, rational attackers take deceptive… 

References

SHOWING 1-10 OF 47 REFERENCES

Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief

It is shown that control systems are guaranteed to be secure in an asymptotic manner by rendering reactions against potentially harmful actions covert, which indicates the importance of covertness of reactions for designing secure control systems.

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler’s asymptotic behaviors against cyber attacks to control systems and shows that the defender's belief on existence of an attacker converges over time for any attacker's strategy provided that the stochastic dynamics of the control system is known to the defender.

Deception-As-Defense Framework for Cyber-Physical Systems

Under the solution concept of game-theoretic hierarchical equilibrium, this work arrives at a semi-definite programming problem equivalent to the infinite-dimensional optimization problem faced by the defender while selecting the best strategy when the information of interest is Gaussian and both sides have quadratic cost functions.

A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

A taxonomy is proposed that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement and provides a systematic foundation for understanding different types of defensive deception commonly encountered in cybersecurity and privacy.

Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned

This book is claimed to be the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the U.S. Federal Air Marshals Service.

Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence

This paper extends signaling games by including a detector that gives off probabilistic warnings when the sender acts deceptively, and derives pooling and partially separating equilibria of the game.

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

A novel attack tree paradigm called attack countermeasure tree (ACT) is presented which avoids the generation and solution of a state-space model and takes into account attacks as well as countermeasures (in the form of detection and mitigation events).

Dynamic Security Risk Management Using Bayesian Attack Graphs

This paper proposes a risk management framework using Bayesian networks that enable a system administrator to quantify the chances of network compromise at various levels and shows how to use this information to develop a security mitigation and management plan.

Security measure allocation for industrial control systems: Exploiting systematic search techniques and submodularity

This paper proposes a framework that can be used once the attacker exploits security vulnerabilities to gain control over some of the sensors and actuators, and proposes an algorithm that uses the nondecreasing properties of the impact and complexity functions and property of the security measure allocation problem to speed up the search.

Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition

This paper proposes epistemic signaling games based on the Mertens-Zamir model, which explicitly quantifies players’ asymmetric recognition, and analytically characterized with an interpretation.