Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers

  • Dinuka Sahabandu
  • , Shana Moothedath
  • , Joey Allen
  • , Andrew Clark
  • , Linda Bushnell
  • , Wenke Lee
  • , Radha Poovendran

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Dynamic Information Flow Tracking (DIFT) has been proposed to detect and prevent various cyber attacks in computer systems. DIFT tracks suspicious information flows in the system and generates security analysis when anomalous behavior is detected. A system threatened by attackers of different capabilities demands simultaneous analysis of multiple flows. As the number of information flows in a system is typically large and the amount of resource required for analyzing different flows varies, an optimal allocation of the limited resources available to DIFT is essential. We address the problem of detecting multiple attackers using resource constrained DIFT and develop a model that captures the interaction of adversaries and a DIFT-based defender as a multi-player dynamic game. Our model consists of a multi-stage game, in which each stage represents the subset of processes in the system that correspond to the locations of the information flows, and captures the notion of benign flows. Given the attackers' strategies, we prove that finding an optimal defense strategy is equivalent to maximizing an increasing DR-submodular function that enables us to propose an approximation algorithm. Further, given a defense strategy and strategies of other attackers, we show that finding an optimal attacker strategy is equivalent to solving a shortest path problem, where the edge weights are derived from the strategies of the other players. Based on this mapping we propose a polynomial-time algorithm for computing an optimal attacker strategy. Finally, we evaluate the performance of our algorithm on a real-world dataset of a nation state attack obtained using the Refinable Attack INvestigation (RAIN) framework.

Original languageEnglish
Title of host publication2019 IEEE 58th Conference on Decision and Control, CDC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages567-574
Number of pages8
ISBN (Electronic)9781728113982
DOIs
StatePublished - Dec 2019
Event58th IEEE Conference on Decision and Control, CDC 2019 - Nice, France
Duration: Dec 11 2019Dec 13 2019

Publication series

NameProceedings of the IEEE Conference on Decision and Control
Volume2019-December
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference58th IEEE Conference on Decision and Control, CDC 2019
Country/TerritoryFrance
CityNice
Period12/11/1912/13/19

Fingerprint

Dive into the research topics of 'Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers'. Together they form a unique fingerprint.

Cite this