Network systems often contain vulnerabilities that remain unfixed in a network for various reasons, such as the lack of a patch or knowledge to fix them. With the presence of such residual vulnerabilities, the network administrator should properly react to the malicious activities or proactively prevent them, by applying suitable countermeasures that minimize the likelihood of an attack by the attacker. In this paper, we propose a stochastic game-theoretic approach for analyzing network security and synthesizing defense strategies to protect a network. To support analysis under partial observation, where some of the attacker's activities are unobservable or undetectable by the defender, we construct a one-sided partially observable security game and transform it into a perfect game for further analysis. We prove that this transformation is sound for a sub-class of security games and a subset of properties specified in the logic rPATL. We implement a prototype that fully automates our approach, and evaluate it by conducting experiments on a real-life network.
翻译:网络系统往往由于各种原因,例如缺乏修补或修补这些系统的知识或知识等原因,在网络中存在不固定的弱点。由于存在这些残余弱点,网络管理员应该对恶意活动作出适当反应或主动加以预防,采取适当对策,尽量减少攻击者攻击的可能性。在本文中,我们提议采用随机游戏理论方法,分析网络安全并合成防御战略以保护网络。为了支持部分观察的分析,即攻击者的一些活动为防御者所无法观察或无法探测,我们建造了一个片面部分观察的安全游戏,并将它转变成一个完美的游戏,供进一步分析。我们证明这种转变对于一个小类的安全游戏和逻辑 rPATL 中所规定的一系列属性是健全的。我们实施一个完全自动化的原型,通过在现实生活网络上进行实验来评估它。