Abstract
Game theory has been researched extensively in network security demonstrating an advantage of modeling the interactions between attackers and defenders. Game theoretic defense solutions have continuously evolved in most recent years. One of the pressing issues in composing a game theoretic defense system is the development of consistent quantifiable metrics to select the best game theoretic defense model. We survey existing game theoretic defense, information assurance, and risk assessment frameworks that provide metrics for information and network security and performance assessment. Coupling these frameworks, we propose a game theoretic approach to attack-defense and performance metric taxonomy (ADAPT). ADAPT uses three classifications of metrics: (i) Attacker, (ii) Defender (iii) Performance. We proffer ADAPT with an attempt to aid game theoretic performance metrics. We further propose a game decision system (GDS) that uses ADAPT to compare competing game models. We demonstrate our approach using a distributed denial of service (DDoS) attack scenario.
Chapter PDF
Similar content being viewed by others
References
Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The role of game theory in information warfare. In: Proceedings of the 4th Information Survivability Workshop, ISW-2001/2002 (2002)
Jiang, W., Tian, Z., Zhang, H., Song, X.: A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. In: IEEE International Conference on Networking, Sensing and Control, pp. 648–653 (April 2008)
Bellovin, S.: On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Security and Privacy 4(4) (July-August 2006)
National Cyber Security Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior: An Industry, Academic and Government Perspective, The Institute for Information Infrastructure Protection, I3P (2009), http://www.thei3p.org/docs/publications/i3pnationalcybersecurity.pdf
Gopalakrishnan, J., Marden, R., Wierman, A.: An architectural view of game theoretic control. ACM SIGMETRICS Performance Evaluation Review 38(3) (2011)
He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. In: Proceedings of the 2008 International Conference on Computer Science and Software Engineering, vol. 3 (2008)
Bryant, A.R.: Developing a framework for evaluating organizational information assurance metrics programs. Thesis, Airforce Institute of Technology, Defense Technical Information Center (2007)
Savola, R.: A Novel Security Metrics Taxonomy for R&D Organizations. In: Proceedings of the 7th Annual Information Security Conference (2008)
Wesner, J.W.: Winning with quality: Applying quality principles in product development. Addison-Wesley, New York (1994)
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: HICSS43 Hawaii International Conference on System Sciences (2009)
Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. In: ACM CCR (April 2004)
Li, Z., Goyal, A., Chen, Y., Paxson, V.: Automating analysis of large-scale botnet probing events. In: ASIACCS 2009 (2009)
Parameswaran, M., Rui, H., Sayin, S.: A game theoretic model and empirical analysis of spammer strategies. In: Collaboration, Electronic Messaging, AntiAbuse and Spam Conf., vol. 7 (2010)
Payne, S.: A Guide to Security Metrics. SANS Institute (June 2006)
Swanson, M.: NIST Special Publication 800-55: Security Metrics Guide for Information Technology Systems (2003)
The National Science and Technology Council. Federal plan for cyber security and information assurance research and development (2006)
Vaughn, R., Henning, R., Siraj, A.: Information Assurance Measures and Metrics: State of Practice and Proposed Taxonomy. In: Proceedings of 36th Hawaii International Conference on System Science, HICSS 2003 (2003)
Manadhata, J., Wing, P.: An attack surface metric. Technical Report CMU-CS-05-155 (2005)
Carin, L., Cybenko, G., Hughes, J.: Quantitative Evaluation of Risk for Investment Efficient Strategies in Cyber security: The QuERIES Methodology. IEEE Computer (2008)
Lye, K., Wing, J.: Game strategies in network security. In: Proceedings of the Foundations of Computer Security (2002)
Cremonini, M., Nizovtsev, D.: Understanding and Influencing Attackers Decisions: Implications for Security Investment Strategies. In: 5th Workshop on the Economics of Information Security (June 2006)
You, X., Shiyong, Z.: A kind of network security behavior model based on game theory. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (2003)
Burke, D.A.: Towards a game theory model of information warfare. Master Thesis, Air Force Institute of Technology, USA (1999)
Jansen, W.: Directions in Security Metrics Research. NISTIR 7564 (March 2009)
Alpcan, T., Baser, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proc. of the 43rd IEEE Conference on Decision and Control (2004)
Shiva, S., Roy, S., Bedi, H., Dasgupta, D., Wu, Q.: An Imperfect Information Stochastic Game Model for Cyber Security. In: The 5th Intnl. Conference on i-Warfare and Security (2010)
Center for Internet Security. “The CIS Security Metrics” (May 2009), https://www.cissecurity.org/tools2/metrics/CIS_Security_Metricsv1.0.0.pdf
McGraw, G.: Software Security: Building Security. Addison-Wesley (2006)
Simmons, C., Shiva, S., Dasgupta, D., Wu., Q.: AVOIDIT: A cyber attack taxonomy. Technical Report: CS-09-003, University of Memphis (August 2009)
Bedi, H., Shiva, S., Simmons, C., Shandilya, V.: A Game Inspired Defense Architecture. In: GameSec 2012 (Poster), Conference on Decision and Game Theory for Security (2012)
Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks. SpringSim (2010)
Bedi, H., Roy, S., Shiva, S.: Game Theory-based Defense Mechanisms against DDoS Attacks on TCP/TCP-friendly Flows. In: IEEE Symposium on Computational Intelligence in Cyber Security, Paris, France (2011)
Paruchuri, P., Pearce, J.P., Tambe, M., Ordonez, F., Kraus, S.: An Efficient Heuristic Approach for Security Against Multiple Adversaries. In: AAMAS (2007)
Shiva, S., Roy, S., Dasgupta, D.: Game Theory for Cyber Security. In: 6th Cyber Security and Information Intelligence Research Workshop (April 2010)
Shiva, S., Bedi, H.S., Simmons, C.B., Fisher II, M., Dharam, R.: A Holistic Game Inspired Defense Architecture. In: Gaol, F.L. (ed.) Recent Progress in DEIT, Vol. 2. LNEE, vol. 157, pp. 471–476. Springer, Heidelberg (2012)
Nagaraja, S., Anderson, R.: The topology of covert conflict. In: Proceedings of the 5th Workshop on The Economics of Information Security, WEIS 2006 (2006)
Bloem, M., Alpcan, T., Basar, T.: Intrusion response as a resource allocation problem. In: IEEE Conference on Decision and Control (2006)
Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security, TISSEC (2005)
Fink, G., Chappell, B., Turner, T., O’Donoghue, K.: A metrics-based approach to intrusion detection system evaluation for distributed real-time systems. In: Proceedings of the 16th International Parallel and Distributed Processing Symposium, Fort Lauderdale, FL, USA (April 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Simmons, C.B., Shiva, S.G., Bedi, H.S., Shandilya, V. (2013). ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds) Security and Privacy Protection in Information Processing Systems. SEC 2013. IFIP Advances in Information and Communication Technology, vol 405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39218-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-39218-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39217-7
Online ISBN: 978-3-642-39218-4
eBook Packages: Computer ScienceComputer Science (R0)