The Community for Technology Leaders
Green Image
Issue No. 04 - July-Aug. (2012 vol. 9)
ISSN: 1545-5971
pp: 482-493
Peter L. Bartlett , University of California Berkeley, Berkeley
Benjamin I.P. Rubinstein , Microsoft Research, Mountain View
Adam Barth , Google Inc., Mountain View
John C. Mitchell , Stanford University, Stanford
Mukund Sundararajan , Google Inc., Mountain View
Dawn Song , University of California Berkeley, Berkeley
ABSTRACT
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.
INDEX TERMS
Reactive security, risk management, attack graphs, online learning, adversarial learning, game theory.
CITATION
Peter L. Bartlett, Benjamin I.P. Rubinstein, Adam Barth, John C. Mitchell, Mukund Sundararajan, Dawn Song, "A Learning-Based Approach to Reactive Security", IEEE Transactions on Dependable and Secure Computing, vol. 9, no. , pp. 482-493, July-Aug. 2012, doi:10.1109/TDSC.2011.42
100 ms
(Ver )