Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks

Aron Laszka, Benjamin Johnson, Jens Grossklags

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

22 Scopus citations

Abstract

Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more value over a longer period of time. These covert attacks come in multiple varieties, which can be categorized into two main types: targeted and non-targeted attacks. Targeted attacks include, for example, cyberespionage, while non-targeted attacks include botnet recruitment. We are concerned with the subclass of these attacks for which detection is too costly or technically infeasible given the capabilities of a typical organization. As a result, defenders have to mitigate potential damages under a regime of incomplete information. A primary mitigation strategy is to reset potentially compromised resources to a known safe state, for example, by reinstalling computer systems, and changing passwords or cryptographic private keys. In a game-theoretic framework, we study the economically optimal mitigation strategies in the presence of targeted and non-targeted covert attacks. Our work has practical implications for the definition of security policies, in particular, for password and key renewal schedules.

Original languageEnglish
Title of host publicationWeb and Internet Economics - 9th International Conference, WINE 2013, Proceedings
Pages319-332
Number of pages14
DOIs
StatePublished - 2013
Externally publishedYes
Event9th International Conference on Web and Internet Economics, WINE 2013 - Cambridge, MA, United States
Duration: 11 Dec 201314 Dec 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8289 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Web and Internet Economics, WINE 2013
Country/TerritoryUnited States
CityCambridge, MA
Period11/12/1314/12/13

Keywords

  • Computer Security
  • Covert Compromise
  • Game Theory
  • Non-Targeted Attacks
  • Targeted Attacks

Fingerprint

Dive into the research topics of 'Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks'. Together they form a unique fingerprint.

Cite this