Efficient Defense Strategies to Minimize Attackers’ Success Probabilities in Honeynet
Resource
IAS’10. (EI), 80-85
Journal
IAS’10. (EI)
Pages
80-85
Date Issued
2010
Date
2010
Author(s)
Abstract
In this paper, we consider the problem of minimizing attackers' success probability in a protected network subject to attacker profile/behavior constraints and defender resource/strategy constraints. Compared with previous research, the following two enhancements are made. First, we no longer assume that perfect knowledge regarding the network topology and defense resource allocation is fully available for attackers (a worst case scenario for the defender). Second, all combinations of attacker classes can be considered, where each attacker class may be associated with any number of attributes, including ratio, intelligence/experience level, available attack resource and sophisticated attack strategies. The problem is modeled as a generic mathematical programming problem, and a novel two-phase solution approach, which well combines mathematical programming and simulation techniques, is proposed. More specifically, in the "Evaluation Phase", efficient and effective simulations are conducted to evaluate the effectiveness of the current defense policy; whereas, in the "Defense Policy Enhancement Phase", specially-proposed and easy-to-collect information from the "Objective Function Evaluation Phase" is adopted to calculate gradients of the decision variables. From computational experiments on honeynet, applicability and effectiveness of the proposed framework and algorithm are clearly demonstrated. © 2010 IEEE.
SDGs
Other Subjects
Attack strategies; Computational experiment; Decision variables; Defense policy; Defense strategy; Evaluation phase; Framework and algorithms; Honeynet; Honeypots; Imperfect Knowledge; Mathematical programming problem; Network attack; Network survivability; Network topology; Phase solutions; Protected networks; Simulation technique; Worst case scenario; Computer crime; Electric network topology; Function evaluation; Network security; Probability; Mathematical programming
Type
conference paper
File(s)![Thumbnail Image]()
Loading...
Name
17.pdf
Size
23.21 KB
Format
Adobe PDF
Checksum
(MD5):bc891e09b01acd5dce7f8b554e9822ec