TY - GEN
T1 - Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment
AU - Bhambri, Siddhant
AU - Chauhan, Purv
AU - Araujo, Frederico
AU - Doupé, Adam
AU - Kambhampati, Subbarao
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023
Y1 - 2023
N2 - Identifying the actual adversarial threat against a system vulnerability has been a long-standing challenge for cybersecurity research. To determine an optimal strategy for the defender, game-theoretic based decision models have been widely used to simulate the real-world attacker-defender scenarios while taking the defender’s constraints into consideration. In this work, we focus on understanding human attacker behaviors in order to optimize the defender’s strategy. To achieve this goal, we model attacker-defender engagements as Markov Games and search for their Bayesian Stackelberg Equilibrium. We validate our modeling approach and report our empirical findings using a Capture-The-Flag (CTF) setup, and we conduct user studies on adversaries with varying skill-levels. Our studies show that application-level deceptions are an optimal mitigation strategy against targeted attacks—outperforming classic cyber-defensive maneuvers, such as patching or blocking network requests. We use this result to further hypothesize over the attacker’s behaviors when trapped in an embedded honeypot environment and present a detailed analysis of the same.
AB - Identifying the actual adversarial threat against a system vulnerability has been a long-standing challenge for cybersecurity research. To determine an optimal strategy for the defender, game-theoretic based decision models have been widely used to simulate the real-world attacker-defender scenarios while taking the defender’s constraints into consideration. In this work, we focus on understanding human attacker behaviors in order to optimize the defender’s strategy. To achieve this goal, we model attacker-defender engagements as Markov Games and search for their Bayesian Stackelberg Equilibrium. We validate our modeling approach and report our empirical findings using a Capture-The-Flag (CTF) setup, and we conduct user studies on adversaries with varying skill-levels. Our studies show that application-level deceptions are an optimal mitigation strategy against targeted attacks—outperforming classic cyber-defensive maneuvers, such as patching or blocking network requests. We use this result to further hypothesize over the attacker’s behaviors when trapped in an embedded honeypot environment and present a detailed analysis of the same.
KW - Adversarial behavior
KW - Capture-The-Flag
KW - Markov Games
UR - http://www.scopus.com/inward/record.url?scp=85151117941&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85151117941&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-26369-9_5
DO - 10.1007/978-3-031-26369-9_5
M3 - Conference contribution
AN - SCOPUS:85151117941
SN - 9783031263682
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 87
EP - 106
BT - Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Proceedings
A2 - Fang, Fei
A2 - Xu, Haifeng
A2 - Hayel, Yezekael
PB - Springer Science and Business Media Deutschland GmbH
T2 - 13th International Conference on Decision and Game Theory for Security, GameSec 2022
Y2 - 26 October 2022 through 28 October 2022
ER -