Abstract
Critical information infrastructures have been exposed to an increasing number of cyber attacks in recent years. Current protection approaches consider the reaction to a threat from an operational perspective, but leave out human aspects of an attacker. The problem is, no matter how good a defense planning from an operational perspective is, it must be considered that any action taken might influence an attacker’s belief in reaching a goal. For solving this problem this paper introduces a formal model of belief states for defender and intruder agents in a cyber-security setting. We do not only consider an attacker as a deterministic threat, but consider her as a human being and provide a formal method for reasoning about her beliefs given our reactions to her actions, providing more powerful means to assess the merits of countermeasures when planning cyber-security defense strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brdiczka, O., Liu, J., Price, B., Shen, J., Patil, A., Chow, R., Bart, E., Ducheneaut, N.: Proactive insider threat detection through graph learning and psychological context. In: Security and Privacy Workshops (SPW), pp. 142–149. IEEE (2012)
Chiesa, R.: Peering in the soul of hackers: HPP (the hacker’s profiling project) v2.0 reloaded. In: 8.8 Security Conference, Santiago, Chile. 8dot8 (2012)
Chiesa, R., Ducci, S., Ciappi, S.: Profiling Hackers: the science of criminal profiling as applied to the world of hacking. CRC Press (2008)
Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Computer Security Applications Conference, pp. 121–130. IEEE (2006)
Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Computer Security Foundations Workshop, pp. 49–63. IEEE (2002)
Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., Cunningham, R.: Validating and restoring defense in depth using attack graphs. In: Military Communications Conference (MILCOM), pp. 1–10. IEEE (2006)
Martiny, K., Möller, R.: A probabilistic doxastic temporal logic for reasoning about beliefs in multi-agent systems. In: 7th International Conference on Agents and Artificial Intelligence (ICAART) (2015)
Noel, S., Jajodia, S.: Optimal IDS sensor placement and alert prioritization using attack graphs. J. Netw. Syst. Manag. 16(3), 259–275 (2008)
Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: A logic-based network security analyzer. In: USENIX Security (2005)
Ou, X., Singhal, A.: Attack graph techniques. In: Quantitative Security Risk Assessment of Enterprise Networks, pp. 5–8. Springer (2011)
Phillips, C., Swiler, L.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms, pp. 71–79. ACM (1998)
Rogers, M.K.: A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Ph.D. thesis, University of Manitoba (2001)
Roy, A., Kim, D.S., Trivedi, K.: Cyber security analysis using attack countermeasure trees. In: 6th Annual Workshop on Cyber Security and Information Intelligence Research, p. 28. ACM (2010)
Roy, A., Kim, D.S., Trivedi, K.: Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In: Dependable Systems and Networks, pp. 1–12. IEEE (2012)
Sommestad, T., Ekstedt, M., Johnson, P.: Cyber security risks assessment with bayesian defense graphs and architectural models. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2009)
Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to information systems and the effectiveness of ISO17799. Comput. Secur. 24(6), 472–484 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Martiny, K., Motzek, A., Möller, R. (2015). Formalizing Agents’ Beliefs for Cyber-Security Defense Strategy Planning. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)