skip to main content
10.1145/2459976.2460032acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Applying POMDP to moving target optimization

Published:08 January 2013Publication History

ABSTRACT

Diversity maintains security by making the computing environment less standard and less predictable. Recent studies show that many randomization techniques, e.g. address space layout randomization (ASLR) significantly enhance system security simply through reducing the number of return to libc exploits [14]. However, "diversity" may incur significant overhead on the computing platforms. We study the problem of implementing diversity to trade off security performance with diversity implementation costs. We address this problem by formulating it as a partially observable Markov decision process (POMDP). An optimal solution considering a fixed amount of history can be obtained by transforming the POMDP optimization problem into a nonlinear programming (NLP) problem. Simulation results for a set of benchmark problems illustrate the effectiveness of the proposed method.

Skip Supplemental Material Section

Supplemental Material

References

  1. C. Amato, D. S. Bernstein, and S. Zilberstein. Optimizing fixed-size stochastic controllers for pomdps and decentralized pomdps. Auton Agent Multi-Agent Syst, 21:293âĂŞ320, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. R. Cassandra. Tony's pomdp file repository page. http://www.cassandra.org/pomdp/examples/index.shtml, (Last Accessed: 09/2012).Google ScholarGoogle Scholar
  3. E. Florio. From bootroot to trojan. mebroot: A rootkit in your mbr. http:www.symatec.com/connect/blogs/bootroot-trojanmerbroot-rootkit-your-mbr, (Last Accessed: 05/2012).Google ScholarGoogle Scholar
  4. S. Forrest, A. Somaya, and D. H. Ackley. Building diverse computer systems. 6th Workshop on Hot Topics in Operating Systems, pages 67--73, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Giuffrida and A. Kuijsten. Enhanced operating system security through efficient and fine-grained address space randomization. In Proceedings of the USENIX Security'12, August 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Huang, D. Evans, J. Katz, and L. Malka. Faster two-party computation using garbled circuits. In Usenix Security 2011, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Pineau, J. Gordon, and S. Thrun. Point-based value iteration: An anytime algorithm for pomdps. In Proceedings of the eighteenth international joint conference on artificial intelligence, pages 1025--1032, Acapulco, Mexico, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams. Secure two-party computation is practical. In Advances in Cryptology âĂŞ AsiaCrypt 2009, volume 5912/2009, pages 250--267. LNCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Poupart. Exploiting structure to efficiently solve large scale partially observable markov decision processes. Ph. D. Dissertation, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. RAtchev, G. B. M. Hutton, and B. van Antwerpen. Verifying the correctness of fpga logic synthesis algorithms. In Proceedings of the 2003 ACM/SIGADA, pages 84--89. 11th International Symposium on Field Programmable Gate Arrays, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Smith and R. Simmons. Heuristic search value iteration for pomdps. In Proceedings of the twentieth conference on uncertainty in artificial intelligence, pages 520--527, Banff, Canada, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Smith and R. Simmons. Point-based pomdp algorithms: Improved analysis and implementation. In Proceedings of the twenty-first conference on uncertainty in artificial intelligence., Edinburgh, Scotland., 2005.Google ScholarGoogle Scholar
  13. M. Spaan and N. Vlassis. Perseus: randomized point-based value iteration for pomdps. Journal of Artificial Intelligence Research, 24:195âĂŞ220, 2005. Google ScholarGoogle ScholarCross RefCross Ref
  14. P. Szor. The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Upper Saddle River, NJ, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Z. Wang, X. Jiang, W. Cui, and X. Wang. Countering persistent kernel rootkits through systematic hook discovery. In Recent Advances in Intrusion Detection, pages 21--38. LNCS, Septermber 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Yu. Approximate solution methods for partially observable markov and semi-markov decision processes. Ph. D. Dissertation, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Applying POMDP to moving target optimization

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
              January 2013
              282 pages
              ISBN:9781450316873
              DOI:10.1145/2459976

              Copyright © 2013 Authors

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 8 January 2013

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader