Patching Security Vulnerabilities Using Stackelberg Security Games on Attack Graphs

In Mina Farmanbar, Maria Tzamtzi, Ajit Kumar Verma & Antorweep Chakravorty (eds.), Frontiers of Artificial Intelligence, Ethics, and Multidisciplinary Applications: 1st International Conference on Frontiers of AI, Ethics, and Multidisciplinary Applications (FAIEMA), Greece, 2023. Springer Nature Singapore. pp. 83-98 (2024)
  Copy   BIBTEX

Abstract

We present a method of computing a prioritized set of vulnerabilities consisting of the γ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma $$\end{document}-most critical vulnerabilities of the system under study. We model the strategic attacker–defender interaction as a one-shot Stackelberg game on an attack graph, where the defender seeks to protect his system from a (stealthy) intruder by patching vulnerabilities. Our model supports the possibility of patching several vulnerabilities with one patch and thus yields a more realistic and resource-efficient solution than related ansatzes. The security strategy is obtained by computing pure Stackelberg equilibria using Benders decomposition, and linear and integer optimizations. We showcase the use of our model for decision support for a small robotic system (MiR 100 mobile robot). Our contribution shows, how decision support systems and computational intelligence (i.e. game-theoretic optimization) can be employed ethically: to make cyber-physical systems more secure and safer.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,347

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
De politieke filosofie van zekerheid.Josette Daemen - 2020 - Socialisme and Democratie 77 (2):65-71.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.

Analytics

Added to PP
2024-03-02

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references