A Game Theoretic Analysis of Cyber Threats

A Game Theoretic Analysis of Cyber Threats

Abstract

Cyber threat analysis is crucial to securing modern IT systems. In the ongoing project described here a strictly mathematical method for threat analysis is sketched. The threat landscape between an attacker (hacker) and a defender (system owner) is modeled along the formalisms of stochastic game theory, thus opening the way for a rigorous formal analysis. The key benefit of the project is its applicability to real-world situations. Therefore, the information about possible attack and defense actions is taken from several proven data sources resulting in a large number of actions (173 attack actions and 115 defense actions). We present an adaptation of the so-called Princess-and-Monster game to model the problem. Various problems with the formalization are discussed. To keep the model manageable despite the claim of practicality, it is applied only to specific scenarios mimicking real-world situations.

Grafik Top
Additional Information

DOI: 10.5220/0011792700003405

Grafik Top
Authors
  • Tavolato, Paul
  • Luh, Robert
  • Eresheim, Sebastian
Grafik Top
Shortfacts
Category
Paper in Conference Proceedings or in Workshop Proceedings (Paper)
Event Title
Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP
Divisions
Security and Privacy
Subjects
Angewandte Informatik
Event Location
Lisbon, Portugal
Event Type
Conference
Event Dates
22-24 Feb 2023
ISSN/ISBN
978-989-758-624-8
Page Range
pp. 706-713
Date
2023
Export
Grafik Top