Abstract
Most security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, firms investing in cyber-security for their information technology infrastructure need to consider attack-detection and restoration tools to detect intruders, and restore their system to a safe condition. Attackers face similar investment alternatives; they need to invest resources to finding vulnerabilities in a protected system, and once the protection has been broken, they need to invest in the infrastructure necessary to exploit these attacks and maintain stealthy persistence in the compromised infrastructure. We model this dual considerations as a dynamic programming problem between attackers and defenders and then study the Nash equilibrium of this game. Our goal is to find models and alternatives that can help us understand optimal security investments in prevention and detection against advanced rational adversaries.
| Original language | English |
|---|---|
| Title of host publication | HoTSoS 2017 - Proceedings of the Hot Topics in Science of Security |
| Subtitle of host publication | Symposium and Bootcamp |
| Publisher | Association for Computing Machinery |
| Pages | 24-34 |
| ISBN (Print) | 978-1-4503-5274-1 |
| DOIs | |
| Publication status | Published - Apr 2017 |
| Externally published | Yes |
| Event | 4th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2017 - Hanover, United States Duration: 4 Apr 2017 → 5 Apr 2017 http://hot-sos.com |
Conference
| Conference | 4th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2017 |
|---|---|
| Place | United States |
| City | Hanover |
| Period | 4/04/17 → 5/04/17 |
| Internet address |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
Research Keywords
- Dynamic programming
- Game theory
- Security investments
Fingerprint
Dive into the research topics of 'Optimal security investments in a prevention and detection game'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver