Skip to main content

Game Theory-Based Approach for Defense Against APTs

  • Conference paper
  • First Online:
Applied Cryptography and Network Security (ACNS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12147))

Included in the following conference series:

Abstract

The sophistication of Advanced Persistent Threats (APTs) targeting industrial ecosystems has increased dramatically in recent years. This makes mandatory to develop advanced security services beyond traditional solutions, being Opinion Dynamics one of them. This novel approach proposes a multi-agent collaborative framework that permits to trace an APT throughout its entire life-cycle, as formerly analyzed. In this paper, we introduce TI&TO, a two-player game between an attacker and defender that represents a realistic scenario where both compete for the control of the resources within a modern industrial architecture. By validating this technique using game theory, we demonstrate that Opinion Dynamics consists in an effective first measure to deter and minimize the impact of an APT against the infrastructure in most cases. To achieve this, both attacker and defense models are formalized and an equitable score system is applied, to latter run several simulation test cases with different strategies and network configurations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaspersky Lab ICS CERT. Threat landscape for industrial automation systems. H2 2018 (2019). https://ics-cert.kaspersky.com/reports/2019/03/27/threat-landscape-for-industrial-automation-systems-h2-2018/. Accessed Sept 2019

  2. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)

    Article  Google Scholar 

  3. Lemay, A., Calvet, J., Menet, F., Fernandez, J.M.: Survey of publicly available reports on advanced persistent threat actors. Comput. Secur. 72, 26–59 (2018)

    Article  Google Scholar 

  4. Virvilis, N., Gritzalis, D.: The big four-what we did wrong in advanced persistent threat detection? In: 2013 International Conference on Availability, Reliability and Security, pp. 248–254. IEEE (2013)

    Google Scholar 

  5. Rubio, J.E., Alcaraz, C., Lopez, J.: Preventing advanced persistent threats in complex control networks. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 402–418. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_22

    Chapter  Google Scholar 

  6. Lin, C.-T.: Structural controllability. IEEE Trans. Autom. Control 19(3), 201–208 (1974)

    Article  MathSciNet  Google Scholar 

  7. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2010)

    Google Scholar 

  8. Rubio, J.E., Roman, R., Alcaraz, C., Zhang, Y.: Tracking advanced persistent threats in critical infrastructures through opinion dynamics. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 555–574. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99073-6_27

    Chapter  Google Scholar 

  9. Rubio, J.E., Manulis, M., Alcaraz, C., Lopez, J.: Enhancing security and dependability of industrial networks with opinion dynamics. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 263–280. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29962-0_13

    Chapter  Google Scholar 

  10. Rubio, J.E., Roman, R., Alcaraz, C., Zhang, Y.: Tracking APTs in industrial ecosystems: a proof of concept. J. Comput. Secur. 27, 521–546 (2019)

    Article  Google Scholar 

  11. Lopez, J., Rubio, J.E., Alcaraz, C.: A resilient architecture for the smart grid. IEEE Trans. Ind. Inf. 14, 3745–3753 (2018)

    Article  Google Scholar 

  12. Hegselmann, R., Krause, U., et al.: Opinion dynamics and bounded confidence models, analysis, and simulation. J. Artif. Soc. Soc. Simul. 5(3) (2002)

    Google Scholar 

  13. Lye, K., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1–2), 71–86 (2005)

    Article  Google Scholar 

  14. Nguyen, K.C., Alpcan, T., Basar, T.: Security games with incomplete information. In: 2009 IEEE International Conference on Communications, pp. 1–6. IEEE (2009)

    Google Scholar 

  15. Patcha, A., Park, J.-M.: A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. In: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 280–284. IEEE (2004)

    Google Scholar 

  16. Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: the game of “stealthy takeover”. J. Cryptol. 26(4), 655–713 (2013)

    Article  MathSciNet  Google Scholar 

  17. Alpcan, T., Basar, T.: A game theoretic analysis of intrusion detection in access control systems. In: 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No. 04CH37601), vol. 2, pp. 1568–1573. IEEE (2004)

    Google Scholar 

  18. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)

    Article  Google Scholar 

  19. Pagani, G.A., Aiello, M.: The power grid as a complex network: a survey. Physica A 392(11), 2688–2700 (2013)

    Article  MathSciNet  Google Scholar 

  20. Haynes, T.W., Hedetniemi, S.M., Hedetniemi, S.T., Henning, M.A.: Domination in graphs applied to electric power networks. SIAM J. Discret. Math. 15(4), 519–529 (2002)

    Article  MathSciNet  Google Scholar 

  21. Kneis, J., Mölle, D., Richter, S., Rossmanith, P.: Parameterized power domination complexity. Inf. Process. Lett. 98(4), 145–149 (2006)

    Article  MathSciNet  Google Scholar 

  22. Simaan, M., Cruz, J.B.: On the stackelberg strategy in nonzero-sum games. J. Optim. Theory Appl. 11(5), 533–555 (1973)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work has been partially supported by the EU H2020-SU-ICT-03-2018 Project No. 830929 CyberSec4Europe (cybersec4europe.eu), the EU H2020-MSCA-RISE-2017 Project No. 777996 (SealedGRID), and by a 2019 Leonardo Grant for Researchers and Cultural Creators of the BBVA Foundation. Likewise, the work of the first author has been partially financed by the Spanish Ministry of Education under the FPU program (FPU15/03213).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cristina Alcaraz .

Editor information

Editors and Affiliations

Appendices

A Instantiation of \(\varPsi \), \(\varUpsilon \) and \(\varTheta \) Values

In Sect. 3.3 we have presented an ordered set of probabilities \(\varTheta \) that are mapped to the different attack stages to represent the cost that every movement of the attacker implies, which is summarized in Table 2. There are multiple reasons behing this mapping, that are summarized as follows:

  1. 1.

    We assign the lowest level of detection probability (\(\theta _1\)) only to the devices in the neighbourhood of the affected node in a lateral movement, since some discovery queries will normally raise subtle network alerts.

  2. 2.

    The second lowest probability of detection (\(\theta _2\)) is linked to the elements that are the target of a lateral movement, because these connections usually leverage stealthy techniques to go unnoticed.

  3. 3.

    An initial intrusion causes a mild detection probability \(\theta _3\), since the attacker either makes use of zero-day vulnerabilities or social engineering techniques, which is a crucial stage for the attacker to be successful at breaking into the network through the ‘patient zero’.

  4. 4.

    \(\theta _4\) and \(\theta _5\) are assigned to devices (from the IT and OT section, respectively) causing the delivery of malware to establish a connection to an uncompromised node in a lateral movement. In specific, since the heterogeneity of traffic is lower and the criticality of the resources in that segment is greater, anomalies are likely to be detected when compared to the IT section. On the other hand, \(\theta _5\) is also assigned to the involved nodes in a link removal stage, since it is an evident anomaly sensed by both agents.

  5. 5.

    The highest probability of detection (\(\theta _6\)) is assigned to the last stage of the APT, as it usually causes major disruption in the functionality of a device or the attacker manages to connect to an external network to exfiltrate information, which is easily detected.

Considering a realistic scenario and according to the methodology explained in [8], we have assigned values for this ordered set and also for \(\varPsi \) and \(\varUpsilon \) sets, which regulate the criticality and vulnerability of resources in our simulations. This instantiation of values is shown in Table 4. For the interest of realism and to represent a certain level of randomness in the accuracy of the detection mechanisms that every agent embodies, these values will also include a random deviation in the experiments, with a maximum value of \(\pm 0.1\).

Table 4. Instances of the \(\varPsi ,\varUpsilon ,\varTheta \) ordered sets used in the simulations

B Example of Game Instance with Defender Victory

We have seen that the best results for the defender are achieved when two hops of distance are considered and honeypots are also introduced. In this case, the use of these two tools (besides the redundancy) are enough as to win most of the games. The rationale behind this result is simple: when the attacker attempts to compromise one of this fake nodes, a great anomaly is generated which is detected by the defender, as long as he or she manages to cover a wide area that contains the current position of the attacker (i.e., when 2 or more hops of distance are leveraged by the local Opinion Dynamics). This behavior is shown in Fig. 7: in this network, the attacker traverses the nodes and then they are immediately healed (they are labeled with an ‘X’ when they are attacked and ‘H’ when they are healed, along with the anomaly measured by Opinion Dynamics). In the last movement, the attacker attempts to compromise a honeypot (depicted with a diamond shape) and the defender manages to locate and eradicate the infection. Since the defender does not possess any other compromised node, the game is over.

Fig. 7.
figure 7

Example of defender-win after the attacker compromises a honeypot

C Correctness Proof of TI&TO

This section presents the correctness proof of TI&TO for the different cases that may occur during a certain game instance. This problem is solved when these conditions are met:

  1. 1.

    The attacker can find an IT/OT device to compromise within the infrastructure.

  2. 2.

    The defender is able to trace the threat and heal a node, thanks to the Opinion Dynamics detection.

  3. 3.

    The game system is able to properly finish in a finite time (termination condition).

The first requirement is satisfied since we assume that the attacker can perform different attack stages to define his/her strategy over the game board (assuming \(V\ne \oslash \)), such as lateral movements, links removal or destruction. The modus operandi of the attacker is systematic, beginning with a random node \(v_0 \in V_{IT}\cup V_{OT}\) at \(t=0\) which is compromised (see Algorithm 1). Then, A penetrates the infrastructure to ultimately gain control of the operational or corporate network, where a certain node is finally disrupted (\(V_{OT}\)) after a set of \(\sigma \) lateral movements. In an intermediate time t of the game, the attacker can execute a new stage as long as there is at least one node \(v_a\) such that \(N_{v_a}(t)=1\), which becomes the new attackedNode in Algorithm 1. When the state of all nodes is set to zero, the game terminates.

The second requirement is also met with the inclusion of intrusion detection solutions on every agent \(a_i \in A\) that facilitate the correlation of events. With the local execution of the Opinion Dynamics correlation from \(t=1\) on the node that presents the greatest anomaly (using one or two hops of distance), we ensure that the agents associated with the resulting subgraph of nodes will have an opinion \(x_i(t) \ge 0\). According to Algorithm 2, this means that D will heal the node with maximum opinion if that value surpasses the threshold (0.5, as explained in Sect. 3.4), setting its state back to zero and updating the detection area. Otherwise, he/she will remain idle during that turn.

We can demonstrate the third requirement (corresponding to the termination of the approach) through induction. More precisely, we specify the initial conditions and the base case, namely:

  • Precondition: We assume the attacker models an APT perpetrated against the infrastructure defined by graph G(VE) where \(V\ne \oslash \), following the strategy explained in Algorithm 1. On the other side, the defender leverages Opinion Dynamics to visualize the threat evolution across the infrastructure and eventually repair nodes, following the procedure described in Algorithm 2.

  • Postcondition: The attacker reaches the network G(VE) and compromises at least one node in V such that \(S^A \ne \oslash \) and continues to compromise more devices in the loop in Algorithm 1, to achieve \(numSteps=\sigma \). Player D executes Opinion Dynamics to detect and heal the most affected nodes after executing the correlation. The game evolves until any of the termination states (see Sect. 3.2) are reached.

  • Case 1: \(numSteps=\sigma \), but gameState is still set to zero. In this case, player A has successfully traversed the network having \(Victims \ne \oslash \). Therefore, he/she needs to launch the Destruction movement over the attackedNode. This makes gameState comply with \(TS_1\) temporarily until the defender moves. If D manages to heal attackedNode and \(Victims=\oslash \), then the game also terminates, with \(TS_3\).

  • Case 2: \(numSteps < \sigma \). In this case, the next stage in \(S^A\) implies a lateral movement. If the attacker is still in the first section where the first intrusion took place (whether IT or OT), he/she must locate a firewall to perpetrate the other section before increasing numSteps. After this, the defender can make his/her movement and potentially heal a node, which can make the attacker remove a link in the following iteration. If the node healed is attackedNode, the attacker must choose another node in Victims, resetting \(numSteps=0\). In the event that \(Victims=\oslash \), then the game terminates with state \(TS_2\).

  • Induction: If we assume that we are in step t (\(t \ge 1\)) in the loop in Algorithm 1, then Case 1 is going to be considered until A completes his/her strategy (\(TS_1\) or \(TS_3\)). In any other case, Case 2 applies until achieving \(numSteps=\sigma \) (hence applying Case 1 again) or \(Victims=\oslash \). In this last case, the game finishes with \(TS_2\).

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rubio, J.E., Alcaraz, C., Lopez, J. (2020). Game Theory-Based Approach for Defense Against APTs. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds) Applied Cryptography and Network Security. ACNS 2020. Lecture Notes in Computer Science(), vol 12147. Springer, Cham. https://doi.org/10.1007/978-3-030-57878-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57878-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57877-0

  • Online ISBN: 978-3-030-57878-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics