Data Driven Game Theoretic Cyber Threat Mitigation

Description
Penetration testing is regarded as the gold-standard for understanding how well an organization can withstand sophisticated cyber-attacks. However, the recent prevalence of markets specializing in zero-day exploits on the darknet make exploits widely available to potential attackers. The cost associated

Penetration testing is regarded as the gold-standard for understanding how well an organization can withstand sophisticated cyber-attacks. However, the recent prevalence of markets specializing in zero-day exploits on the darknet make exploits widely available to potential attackers. The cost associated with these sophisticated kits generally precludes penetration testers from simply obtaining such exploits – so an alternative approach is needed to understand what exploits an attacker will most likely purchase and how to defend against them. In this paper, we introduce a data-driven security game framework to model an attacker and provide policy recommendations to the defender. In addition to providing a formal framework and algorithms to develop strategies, we present experimental results from applying our framework, for various system configurations, on real-world exploit market data actively mined from the darknet.

Downloads

One or more components are restricted to ASU affiliates. Please sign in to view the rest.
Restrictions Statement

Barrett Honors College theses and creative projects are restricted to ASU community members.

Details

Contributors
Date Created
2016-05
Resource Type
Language
  • eng
Additional Information
English
Series
  • Academic Year 2015-2016
Extent
  • 19 pages