skip to main content
10.1145/2459976.2460032acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Applying POMDP to moving target optimization

Published: 08 January 2013 Publication History

Abstract

Diversity maintains security by making the computing environment less standard and less predictable. Recent studies show that many randomization techniques, e.g. address space layout randomization (ASLR) significantly enhance system security simply through reducing the number of return to libc exploits [14]. However, "diversity" may incur significant overhead on the computing platforms. We study the problem of implementing diversity to trade off security performance with diversity implementation costs. We address this problem by formulating it as a partially observable Markov decision process (POMDP). An optimal solution considering a fixed amount of history can be obtained by transforming the POMDP optimization problem into a nonlinear programming (NLP) problem. Simulation results for a set of benchmark problems illustrate the effectiveness of the proposed method.

Supplementary Material

a49-yu.pdf (a49-yu_supp.pdf)
Supplemental file.

References

[1]
C. Amato, D. S. Bernstein, and S. Zilberstein. Optimizing fixed-size stochastic controllers for pomdps and decentralized pomdps. Auton Agent Multi-Agent Syst, 21:293âĂŞ320, 2010.
[2]
A. R. Cassandra. Tony's pomdp file repository page. http://www.cassandra.org/pomdp/examples/index.shtml, (Last Accessed: 09/2012).
[3]
E. Florio. From bootroot to trojan. mebroot: A rootkit in your mbr. http:www.symatec.com/connect/blogs/bootroot-trojanmerbroot-rootkit-your-mbr, (Last Accessed: 05/2012).
[4]
S. Forrest, A. Somaya, and D. H. Ackley. Building diverse computer systems. 6th Workshop on Hot Topics in Operating Systems, pages 67--73, May 2006.
[5]
C. Giuffrida and A. Kuijsten. Enhanced operating system security through efficient and fine-grained address space randomization. In Proceedings of the USENIX Security'12, August 2012.
[6]
Y. Huang, D. Evans, J. Katz, and L. Malka. Faster two-party computation using garbled circuits. In Usenix Security 2011, 2011.
[7]
J. Pineau, J. Gordon, and S. Thrun. Point-based value iteration: An anytime algorithm for pomdps. In Proceedings of the eighteenth international joint conference on artificial intelligence, pages 1025--1032, Acapulco, Mexico, 2003.
[8]
B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams. Secure two-party computation is practical. In Advances in Cryptology âĂŞ AsiaCrypt 2009, volume 5912/2009, pages 250--267. LNCS, 2009.
[9]
P. Poupart. Exploiting structure to efficiently solve large scale partially observable markov decision processes. Ph. D. Dissertation, 2005.
[10]
B. RAtchev, G. B. M. Hutton, and B. van Antwerpen. Verifying the correctness of fpga logic synthesis algorithms. In Proceedings of the 2003 ACM/SIGADA, pages 84--89. 11th International Symposium on Field Programmable Gate Arrays, 2003.
[11]
T. Smith and R. Simmons. Heuristic search value iteration for pomdps. In Proceedings of the twentieth conference on uncertainty in artificial intelligence, pages 520--527, Banff, Canada, 2004.
[12]
T. Smith and R. Simmons. Point-based pomdp algorithms: Improved analysis and implementation. In Proceedings of the twenty-first conference on uncertainty in artificial intelligence., Edinburgh, Scotland., 2005.
[13]
M. Spaan and N. Vlassis. Perseus: randomized point-based value iteration for pomdps. Journal of Artificial Intelligence Research, 24:195âĂŞ220, 2005.
[14]
P. Szor. The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Upper Saddle River, NJ, 2005.
[15]
Z. Wang, X. Jiang, W. Cui, and X. Wang. Countering persistent kernel rootkits through systematic hook discovery. In Recent Advances in Intrusion Detection, pages 21--38. LNCS, Septermber 2008.
[16]
H. Yu. Approximate solution methods for partially observable markov and semi-markov decision processes. Ph. D. Dissertation, 2004.

Cited By

View all
  • (2018)Stochastic Tools for Network Intrusion DetectionProceedings of International Symposium on Sensor Networks, Systems and Security10.1007/978-3-319-75683-7_15(197-205)Online publication date: 24-May-2018
  • (2015)Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack GraphsProceedings of the Second ACM Workshop on Moving Target Defense10.1145/2808475.2808482(67-76)Online publication date: 12-Oct-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. NLP
  2. POMDP
  3. diversity implementation

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Stochastic Tools for Network Intrusion DetectionProceedings of International Symposium on Sensor Networks, Systems and Security10.1007/978-3-319-75683-7_15(197-205)Online publication date: 24-May-2018
  • (2015)Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack GraphsProceedings of the Second ACM Workshop on Moving Target Defense10.1145/2808475.2808482(67-76)Online publication date: 12-Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media