Back to Search Start Over

Harnessing the Power of Deception in Attack Graph-Based Security Games

Authors :
Fei Fang
Kevin S. Chan
Nandi O. Leslie
Weiran Shen
Charles A. Kamhoua
Stephanie Milani
Sridhar Venkatesan
Source :
Lecture Notes in Computer Science ISBN: 9783030647926, GameSec
Publication Year :
2020
Publisher :
Springer International Publishing, 2020.

Abstract

We study the use of deception in attack graph-based Stackelberg security games. In our setting, in addition to allocating defensive resources to protect important targets from attackers, the defender can strategically manipulate the attack graph through three main types of deceptive actions. We show that finding the optimal deception and defense strategy is at least NP-hard. We provide two techniques for efficiently solving this problem: a mixed-integer linear program for layered directed acyclic graphs (DAGs) and neural architecture search for general DAGs. We empirically demonstrate that using deception on attack graphs gives the defender a significant advantage, and the algorithms we develop scale gracefully to medium-sized problems.

Details

ISBN :
978-3-030-64792-6
ISBNs :
9783030647926
Database :
OpenAIRE
Journal :
Lecture Notes in Computer Science ISBN: 9783030647926, GameSec
Accession number :
edsair.doi...........a7219cfb3b9eb57db602e4e524fde3ea
Full Text :
https://doi.org/10.1007/978-3-030-64793-3_8