skip to main content
10.5555/2484920.2484955acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Optimal interdiction of attack plans

Published: 06 May 2013 Publication History

Abstract

We present a Stackelberg game model of security in which the defender chooses a mitigation strategy that interdicts potential attack actions, and the attacker responds by computing an optimal attack plan that circumvents the deployed mitigations. First, we offer a general formulation for deterministic plan interdiction as a mixed-integer program, and use constraint generation to compute optimal solutions, leveraging state-of-the-art partial satisfaction planning techniques. We also present a greedy heuristic for this problem, and compare its performance with the optimal MILP-based approach. We then extend our framework to incorporate uncertainty about attacker's capabilities, costs, goals, and action execution uncertainty, and show that these extensions retain the basic structure of the deterministic plan interdiction problem. Introduction of more general models of planning uncertainty require us to model the attacker's problem as a general MDP, and demonstrate that the MDP interdiction problem can still be solved using the basic constraint generation framework.

References

[1]
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In ACM Conference on Computer and Communications Security, pages 217--224, 2002.
[2]
Dimitris Bertsimas and John N. Tsitsiklis. Introduction to Linear Optimization. Athena Scientific, 1997.
[3]
Stefano Bistarelli, Marco Dall'Anglio, and Pamela Peretti. Strategic games on defense trees. In Fourth International Conference on Formal Aspects of Security and Trust, pages 1--15, 2006.
[4]
Mark Boddy, Johnathan Gohde, Tom Haigh, and Steven Harp. Course of action generation for cyber security using classical planning. In International Conference on Automated Planning and Scheduling, pages 12--21, 2005.
[5]
Gerald G. Brown, W. Matthew Carlyle, Robert C. Harney, Eric M. Skroch, and R. Kevin Wood. Interdicting a nuclear-weapons project. Operations Research, 57(4):866--877, 2009.
[6]
Yixin Chen, Benjamin W. Wah, and Chih wei Hsu. Temporal planning using subgoal partitioning and resolution in SGPlan. Journal of Artificial Intelligence Research, 26:323--369, 2006.
[7]
Jerzy Filar and Koos Vrieze. Competitive Markov Decision Processes. Springer-Verlag, 1997.
[8]
P.M. Ghare, D.C. Montgomery, and W.C. Turner. Optimal interdiction policy for a flow network. Naval Research Logistics Quarterly, 18(1):37--45, 1971.
[9]
A.W. McMasters and T.M. Mustin. Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3):261--268, 1970.
[10]
Jorge Lucangeli Obes, Carlos Sarraute, and Gerardo Richarte. Attack planning in the real world. In Second Workshop on Intelligent Security, 2010.
[11]
Praveen Paruchuri, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordónez, and Sarit Kraus. Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In Proceedings of the Seventh International Conference on Autonomous Agents and Multiagent Systems, pages 895--902, 2008.
[12]
Cynthia A. Phillips. The network inhibition problem. In ACM Symposium on Theory of Computing, pages 776--785, 1993.
[13]
James Pita, Milind Tambe, Chris Kiekintveld, Shane Cullen, and Erin Steigerwald. Guards - game theoretic security allocation on a national scale. In Tenth International Conferenceon Autonomous Agents and Multiagent Systems, pages 37--44, 2011.
[14]
Nayot Poolsappasit, Rinku Dewri, and Indrajit Ray. Dynamic security risk management using bayesian attack graphs. IEEE Transactions on Dependable and Secure Computing, 9:61--74, 2012.
[15]
Ronald W. Ritchey and Paul Ammann. Using model checking to analyze network vulnerabilities. In IEEE Symposium on Security and Privacy, pages 156--165, 2000.
[16]
J. Salmeron, K. Wood, and R. Baldrick. Worst-case interdiction analysis of large-scale electric power grids. IEEE Transactions on Power Systems, 24(1):96--104, 2009.
[17]
Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing. Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy, pages 273--284, 2002.
[18]
Laura P. Swiler, Cynthia Phillips, David Ellis, and Stefan Chakerian. Computer-attack graph generation tool. In DARPA Information Survivability Conference and Exposition II, 2001.
[19]
Menkes van den Briel, Romeo Sanchez, Minh B. Do, and Subbarao Kambhampati. Effective approaches for partial satisfaction (over-subscription) planning. In Nineteenth National Conference on Artifical Intelligence, pages 562--569, 2004.
[20]
Thomas Vossen, Michael Ball, and Robert H. Smith. On the use of integer programming models in ai planning. In Sixteenth International Joint Conference on Artificial Intelligence, pages 304--309, 1999.
[21]
Dan Zerkle and Karl Levitt. NetKuang -- A multi-host configuration vulnerability checker. In USENIX Unix Security Symposium, 1996.
[22]
Saman A. Zonouz, Himanshu Khurana, William H. Sanders, and Timothy M. Yardley. RRE: A game-theoretic intrusion response and recovery engine. In International Conference on Dependable Systems and Networks, pages 439--448, 2009.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '13: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
May 2013
1500 pages
ISBN:9781450319935

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 06 May 2013

Check for updates

Author Tags

  1. game theory
  2. plan interdiction
  3. planning
  4. security

Qualifiers

  • Research-article

Conference

AAMAS '13
Sponsor:

Acceptance Rates

AAMAS '13 Paper Acceptance Rate 140 of 599 submissions, 23%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)2
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media