Title :
Efficient defense strategies to minimize attackers´ success probabilities in honeynet
Author :
Lin, Frank Yeong-Sung ; Wang, Yu-Shun ; Tsang, Po-Hao
Author_Institution :
Dept. of Inf. Manage., Nat. Taiwan Univ., Taipei, Taiwan
Abstract :
In this paper, we consider the problem of minimizing attackers´ success probability in a protected network subject to attacker profile/behavior constraints and defender resource/strategy constraints. Compared with previous research, the following two enhancements are made. First, we no longer assume that perfect knowledge regarding the network topology and defense resource allocation is fully available for attackers (a worst case scenario for the defender). Second, all combinations of attacker classes can be considered, where each attacker class may be associated with any number of attributes, including ratio, intelligence/experience level, available attack resource and sophisticated attack strategies. The problem is modeled as a generic mathematical programming problem, and a novel two-phase solution approach, which well combines mathematical programming and simulation techniques, is proposed. More specifically, in the “Evaluation Phase”, efficient and effective simulations are conducted to evaluate the effectiveness of the current defense policy; whereas, in the “Defense Policy Enhancement Phase”, specially-proposed and easy-to-collect information from the “Objective Function Evaluation Phase” is adopted to calculate gradients of the decision variables. From computational experiments on honeynet, applicability and effectiveness of the proposed framework and algorithm are clearly demonstrated.
Keywords :
computer network security; mathematical programming; network topology; probability; resource allocation; Honeynet; attacker class; attacker success probability; defense policy enhancement phase; defense resource allocation; generic mathematical programming; network protection; network topology; Heuristic algorithms; IP networks; Knowledge engineering; Mathematical model; Measurement; Resource management; Security; Honeypots; Imperfect Knowledge; Network Attack and Defense; Network Survivability;
Conference_Titel :
Information Assurance and Security (IAS), 2010 Sixth International Conference on
Conference_Location :
Atlanta, GA
Print_ISBN :
978-1-4244-7407-3
DOI :
10.1109/ISIAS.2010.5604046