The Community for Technology Leaders
Green Image
Issue No. 11 - Nov. (2018 vol. 17)
ISSN: 1536-1233
pp: 2512-2523
Liang Xiao , Department of Communication Engineering, Xiamen University, Xiamen, China
Dongjin Xu , Department of Communication Engineering, Xiamen University, Xiamen, China
Narayan B. Mandayam , Department Electrical and Computer Engineering, Wireless Information Network Laboratory, Rutgers University, New Brunswick, NJ
H. Vincent Poor , Department of Electrical Engineering, Princeton University, Princeton, NJ
Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a cyber system and an APT attacker when each of them makes subjective decisions to choose their scan interval and attack interval, respectively. Both the probability distortion effect and the framing effect are applied to model the deviation of subjective decisions of end-users from the objective decisions governed by expected utility theory, under uncertain attack durations in a pure-strategy game and scan interval in a mixed-strategy game. The CPT-based APT detection game incorporates both the probability weighting distortion and the framing effect of the subjective attacker and security agent of the cyber system, rather than discrete decision weights, as in earlier prospect theoretic study of APT detection. The Nash equilibria of the APT detection game are derived, showing that a subjective attacker becomes risk-seeking if the frame of reference for evaluating the utility is large, and becomes risk-averse if the frame of reference for evaluating the utility is small. A policy hill-climbing (PHC) based detection scheme is proposed to increase the policy uncertainty to fool the attacker in the dynamic game, and a “hotbooting” technique that exploits experiences in similar scenarios to initialize the quality values is developed to accelerate the learning speed of PHC-based detection. A practical example of a mobile network is presented to evaluate the performance of the proposed detection strategy. Simulation results show that the proposed strategy can improve detection performance with a higher data protection level and utilities of the cloud in the presence of an attacker compared with a standard Q-learning strategy.
Games, Security, Distortion, Game theory, Uncertainty, Computational modeling, Mobile computing

L. Xiao, D. Xu, N. B. Mandayam and H. V. Poor, "Attacker-Centric View of a Detection Game against Advanced Persistent Threats," in IEEE Transactions on Mobile Computing, vol. 17, no. 11, pp. 2512-2523, 2018.
314 ms
(Ver 3.3 (11022016))