Journal of Computer Applications ›› 2017, Vol. 37 ›› Issue (9): 2557-2562.DOI: 10.11772/j.issn.1001-9081.2017.09.2557

Previous Articles     Next Articles

Attack-defense game model for advanced persistent threats with asymmetric information

SUN Wenjun1, SU Yang1,2, CAO Zhen1   

  1. 1. Key Laboratory of Network & Information Security, University of the People's Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Institute of Information Security, University of the People's Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2017-03-17 Revised:2017-04-13 Online:2017-09-10 Published:2017-09-13
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61402531), the Natural Science Foundation Research Project of Shaanxi Province (2014JQ8358, 2015JQ6231, 2014JQ8307).

非对称信息条件下APT攻防博弈模型

孙文君1, 苏旸1,2, 曹镇1   

  1. 1. 武警工程大学 网络与信息安全武警部队重点实验室, 西安 710086;
    2. 武警工程大学 信息安全研究所, 西安 710086
  • 通讯作者: 孙文君,sunwenjun94@163.com
  • 作者简介:孙文君(1994-),男,江西上饶人,硕士研究生,CCF会员,主要研究方向:信息安全、网络攻防;苏旸(1975-),男,陕西西安人,教授,博士,CCF会员,主要研究方向:信息安全、网络攻防;曹镇(1994-),男,山东菏泽人,硕士研究生,主要研究方向:信息安全、信息隐藏。
  • 基金资助:
    国家自然科学基金资助项目(61402531);陕西省自然科学基础研究计划项目(2014JQ8358, 2015JQ6231, 2014JQ8307)。

Abstract: To solve the problem of the lack of modeling and analysis of Advanced Persistent Threat (APT) attacks, an attack-defense game model based on FlipIt with asymmetric information was proposed. Firstly, the assets such as targeted hosts in the network system were abstracted as the target resource nodes and the attack-defense scenarios were described as the alternating control of the target nodes. Then, considering the asymmetry of the feedback information observed by the two sides and the incomplete defensive effect, the conditions of the payoff model and the optimal strategy of the attacker and defender were proposed in the case of renewal defense strategy. Besides, theorems of simultaneous and sequential equilibrium were proposed and demonstrated. Finally, numerical illustrations were given to analyze the factors of equilibrium strategy as well as defense payoff and to compare simultaneous and sequential equilibrium. The experimental results show that period strategy is defender's best strategy and the defender can achieve sequential equilibrium meanwhile obtaining more payoffs compared with simultaneous equilibrium by announcing her defense strategy in advance. Conclusions show that the proposed model can theoretically guide defense strategy towards stealthy APT attacks.

Key words: game theory, asymmetric information, network attack, Advanced Persistent Threat (APT), cyber security

摘要: 针对目前缺少对高级持续威胁(APT)攻击理论建模分析的问题,提出了一种基于FlipIt模型的非对称信息条件下的攻防博弈模型。首先,将网络系统中的目标主机等资产抽象为目标资源节点,将攻防场景描述为攻防双方对目标资源的交替控制;然后,考虑到攻防双方在博弈中观察到的反馈信息的不对称性以及防御效果的不彻底性,给出了在防御者采取更新策略时攻防双方的收益模型及最优策略的条件,同时给出并分别证明了达到同步博弈与序贯博弈均衡条件的定理;最后通过数例分析了影响达到均衡时的策略及防御收益的因素,并比较了同步博弈均衡与序贯博弈均衡。结果表明周期策略是防御者的最优策略,并且与同步博弈均衡相比,防御者通过公布其策略达到序贯博弈均衡时的收益更大。实验结果表明所提模型能够在理论上指导应对隐蔽性APT攻击的防御策略。

关键词: 博弈论, 非对称信息, 网络攻击, 高级持续威胁, 网络安全

CLC Number: