Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks
DOI:
https://doi.org/10.13052/jcsm2245-1439.13510Keywords:
Internet of Things, vulnerability, attack graph, game theory, Partially Observable Stochastic GameAbstract
The Internet of Things (IoT) has transformed interactions with the world around us. This technology encompasses a network of connected physical devices often vulnerable to attack. Recently, with billions of devices connected, protecting sensitive data and preventing cyber-attacks are becoming more and more paramount. In this paper, a new technique is proposed to enable the administrator to be aware of the various vulnerabilities threatening his system and to choose the most appropriate remediation method based on his cost constraints. This solution adapts to the specific needs of IoT networks. The approach, AGA-POSG, consists of transforming an IoT network security problem into a finite two-player Partially Observable Stochastic Game (POSG) and extracting the best strategies by Analysing an Attack Graph (AGA). To obtain a good solution, the game is presented in normal form, and the method of eliminating dominated strategies is used to determine the best defense strategies. Efficient security measures were implemented to eliminate or mitigate identified attack paths with costs incurred in the attack graph to the target for each of the two players.
Downloads
References
L. Hamza, Intruder model for generating attack scenarios in computer systems. International Journal of Information and Computer Security, num.(3–4), Vol.13, 2020.
Ingols, K., Lippmann, R., & Piwowarski, K. (2006). Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference (ACSAC’06) (pp. 121–130). IEEE.
Albanese, M., Jajodia, S., & Noel, S. (2012, June). Time-efficient and cost-effective network hardening using attack graphs. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (pp. 1–12). IEEE.
Noel, S. (2018). A review of graph approaches to network security analytics. From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, 300–323.
Nilima, P., & Nitin, P. (2012). A comparative study of network vulnerability analysis using attack graph. World Journal of Science and Technology, vol. 2, Issue 3, p. 91.
Lye, K. W., & Wing, J. M. (2005). Game strategies in network security. International Journal of Information Security, vol. 4, p. 71–86.
Jiang, W., Zhang, H. L., Tian, Z. H., & Song, X. F. (2007, December). A game theoretic method for decision and analysis of the optimal active defense strategy. In 2007 International Conference on Computational Intelligence and Security (CIS 2007) (pp. 819–823). IEEE.
K. Bouafia & L. Hamza, (2022), Game theory approach for analyzing attack graphs, International Journal of Information and Computer Security, Vol. 19(3–4), p. 305–320.
Anwar, A. H., Kamhoua, C., & Leslie, N. (2019, November). A game-theoretic framework for dynamic cyber deception in internet of battlefield things. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 522–526).
Yiğit, B., Gür, G., Alagöz, F., & Tellenbach, B. (2019). Cost-aware securing of IoT systems using attack graphs. Ad Hoc Networks, vol. 86, p. 23–35.
Almazrouei, O., & Magalingam, P. (2022, October). The Internet of Things Network Penetration Testing Model Using Attack Graph Analysis. In 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 360–368). IEEE.
Common Vulnerability Scoring System (CVSS), Retrieved from https://www.first.org/cvss/https://www.first.org/cvss/.
Bair, N., Hamza, L., & Ouali, L. (2021, December). Costs Technique for Analysis Attacks Graphs in Computer Systems. In 2021 24th International Conference on Computer and Information Technology (ICCIT) (pp. 1-6). IEEE. DOI: 10.1109/ICCIT54785.2021.9689915.
Ma, Y., Wu, Y., Yu, D., Ding, L., & Chen, Y. (2022). Vulnerability association evaluation of internet of thing devices based on attack graph. International Journal of Distributed Sensor Networks, vol. 18, no 5, p. 15501329221097817.
Chen, F., Liu, D., Zhang, Y., & Su, J. (2010). A scalable approach to analyzing network security using compact attack graphs. Journal of Networks, vol. 5, no. 5, p. 543.
National Vulnerability Database (NVD), Retrieved from https:/nvd.nist.gov.
Common Vulnerabilities and Exposures (CVE), Retrieved from https://www.cve.org/.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.