4.7 Article

A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats

Journal

IEEE TRANSACTIONS ON AUTOMATIC CONTROL
Volume 65, Issue 12, Pages 5248-5263

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2020.2976040

Keywords

Games; Security; Tagging; Analytical models; Computer architecture; Dynamic scheduling; Target tracking; Advanced persistent threats (APTs); information flow tracking; multistage attacks; multistage dynamic game

Funding

  1. ONR [N00014-16-1-2710 P00002]
  2. DARPA TC [DARPA FA8650-15-C-7556]

Ask authors/readers for more resources

Advanced persistent threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tracking has been proposed to detect APTs. In this article, we develop a dynamic information flow tracking game for resource-efficient detection of APTs via multistage dynamic games. The game evolves on an information flow graph, whose nodes are processes and objects (e.g., file, network endpoints) in the system and the edges capture the interaction between different processes and objects. Each stage of the game has prespecified targets that are characterized by a set of nodes of the graph. The goal of the APT is to evade detection and reach a target node of each stage. The goal of the defender is to maximize the detection probability while minimizing performance overhead on the system. The resource costs of the players are different and the information structure is asymmetric, resulting in a nonzero-sum imperfect information game. We first calculate the best responses of the players and then compute Nash equilibrium for single-stage attacks. We then provide a polynomial-time algorithm to compute a correlated equilibrium for the multistage attack case. Finally, we simulate our model and algorithm on real-world nation state attack data obtained from the Refinable Attack INvestigation (RAIN) system.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Automation & Control Systems

Minimal Input and Output Selection for Stability of Systems With Uncertainties

Zhipeng Liu, Yao Long, Andrew Clark, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)

Article Engineering, Electrical & Electronic

Controlled Islanding via Weak Submodularity

Zhipeng Liu, Andrew Clark, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran

IEEE TRANSACTIONS ON POWER SYSTEMS (2019)

Article Computer Science, Theory & Methods

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks

Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Automation & Control Systems

On the Structure and Computation of Random Walk Times in Finite Graphs

Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)

Article Computer Science, Hardware & Architecture

Truck platoon security: State-of-the-art and road ahead

Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell

Summary: Trucks form a platoon on freeways to save fuel, using technologies like ACC and V2V communication protocol to control their speed. However, these systems may introduce attack surfaces and be vulnerable to cyber attacks. Analyzing the attack surfaces of a truck platoon can help in developing effective defense systems and countermeasures for future security.

COMPUTER NETWORKS (2021)

Article Automation & Control Systems

Secure Control in Partially Observable Environments to Satisfy LTL Specifications

Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

Summary: This article investigates the synthesis of control policies for an agent in a partially observable environment that must satisfy a temporal logic specification while facing an adversary. By limiting the search for policies to finite-state controllers, it offers a manageable approach. Algorithms are presented to determine defender and adversary controllers of fixed sizes that satisfy the specification, as well as to maximize the satisfaction probability under fixed-sized controllers.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Computer Science, Hardware & Architecture

Covert Channel-Based Transmitter Authentication in Controller Area Networks

Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran

Summary: The security of automotive Cyber-Physical Systems (CPSs) is at risk due to the widespread use of legacy in-vehicle communication systems. In this article, the authors propose TACAN, a technique that utilizes covert channels to provide secure authentication of Electronic Control Units (ECUs) on the legacy Controller Area Network (CAN) bus. TACAN consists of three different covert channels for ECU authentication.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Proceedings Paper Computer Science, Information Systems

EVExchange: A Relay Attack on Electric Vehicle Charging System

Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin

Summary: This paper presents a new attack method that steals energy during a V2G communication. By stealing the victim's electricity and making them pay for it, the attacker can gain economic profit while leaving the victim with a completely discharged battery. The authors also propose a modification to the protocol as a countermeasure and validate its effectiveness in a laboratory setting.

COMPUTER SECURITY - ESORICS 2022, PT I (2022)

No Data Available