In the cybersecurity setting, defenders are often at the mercy of their detection technologies and subject to the information and experiences that individual analysts have. In order to give defenders an advantage, it is important to understand an attacker's motivation and their likely next best action. As a first step in modeling this behavior, we introduce a security game framework that simulates interplay between attackers and defenders in a noisy environment, focusing on the factors that drive decision making for attackers and defenders in the variants of the game with full knowledge and observability, knowledge of the parameters but no observability of the state (``partial knowledge''), and zero knowledge or observability (``zero knowledge''). We demonstrate the importance of making the right assumptions about attackers, given significant differences in outcomes. Furthermore, there is a measurable trade-off between false-positives and true-positives in terms of attacker outcomes, suggesting that a more false-positive prone environment may be acceptable under conditions where true-positives are also higher.
翻译:在网络安全环境中,维权者往往听命于其探测技术,并受个人分析人员掌握的信息和经验的影响。为了给维权者一个优势,重要的是要理解攻击者的动机和他们接下来可能采取的最佳行动。作为模拟这种行为的第一步,我们引入一个安全游戏框架,在噪音环境中模拟攻击者和捍卫者之间的相互作用,重点是驱动攻击者和捍卫者在游戏变式中作出决策的因素,同时充分了解和可观察性,了解国家参数,但却不易观察(“部分知识”),以及零知识或可观察性(“零知识” )。鉴于结果存在重大差异,我们展示了对攻击者作出正确假设的重要性。此外,在攻击者结果方面,假积极者与真实积极者之间有可衡量的权衡,表明在真实积极者也更高的条件下,一个更假积极易出现环境是可以接受的。