A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats

  • Shana Moothedath
  • , Dinuka Sahabandu
  • , Joey Allen
  • , Andrew Clark
  • , Linda Bushnell
  • , Wenke Lee
  • , Radha Poovendran

Research output: Contribution to journalArticlepeer-review

30 Scopus citations

Abstract

Advanced persistent threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tracking has been proposed to detect APTs. In this article, we develop a dynamic information flow tracking game for resource-efficient detection of APTs via multistage dynamic games. The game evolves on an information flow graph, whose nodes are processes and objects (e.g., file, network endpoints) in the system and the edges capture the interaction between different processes and objects. Each stage of the game has prespecified targets that are characterized by a set of nodes of the graph. The goal of the APT is to evade detection and reach a target node of each stage. The goal of the defender is to maximize the detection probability while minimizing performance overhead on the system. The resource costs of the players are different and the information structure is asymmetric, resulting in a nonzero-sum imperfect information game. We first calculate the best responses of the players and then compute Nash equilibrium for single-stage attacks. We then provide a polynomial-time algorithm to compute a correlated equilibrium for the multistage attack case. Finally, we simulate our model and algorithm on real-world nation state attack data obtained from the Refinable Attack INvestigation (RAIN) system.

Original languageEnglish
Article number9007765
Pages (from-to)5248-5263
Number of pages16
JournalIEEE Transactions on Automatic Control
Volume65
Issue number12
DOIs
StatePublished - Dec 2020

Keywords

  • Advanced persistent threats (APTs)
  • information flow tracking
  • multistage attacks
  • multistage dynamic game

Fingerprint

Dive into the research topics of 'A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats'. Together they form a unique fingerprint.

Cite this