TY - GEN
T1 - FlipThem
T2 - 5th International Conference on Decision and GameTheory for Security, GameSec 2014
AU - Laszka, Aron
AU - Horvath, Gabor
AU - Felegyhazi, Mark
AU - Buttyán, Levente
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2014.
PY - 2014
Y1 - 2014
N2 - Recent high-profile targeted attacks showed that even the most secure and secluded networks can be compromised by motivated and resourceful attackers, and that such a system compromise may not be immediately detected by the system owner. Researchers at RSA proposed the FlipIt game to study the impact of such stealthy takeovers. In the basic FlipIt game, an attacker and a defender fight over a single resource; in practice, however, systems typically consist of multiple resources that can be targeted. In this paper, we present FlipThem, a generalization of FlipIt to multiple resources. To formulate the players’ goals and study their best strategies, we introduce two control models: in the AND model, the attacker has to compromise all resources in order to take over the entire system, while in the OR model, she has to compromise only one. Our analytical and numerical results provide practical recommendations for defenders.
AB - Recent high-profile targeted attacks showed that even the most secure and secluded networks can be compromised by motivated and resourceful attackers, and that such a system compromise may not be immediately detected by the system owner. Researchers at RSA proposed the FlipIt game to study the impact of such stealthy takeovers. In the basic FlipIt game, an attacker and a defender fight over a single resource; in practice, however, systems typically consist of multiple resources that can be targeted. In this paper, we present FlipThem, a generalization of FlipIt to multiple resources. To formulate the players’ goals and study their best strategies, we introduce two control models: in the AND model, the attacker has to compromise all resources in order to take over the entire system, while in the OR model, she has to compromise only one. Our analytical and numerical results provide practical recommendations for defenders.
UR - http://www.scopus.com/inward/record.url?scp=84910002154&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84910002154&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-12601-2_10
DO - 10.1007/978-3-319-12601-2_10
M3 - Conference contribution
AN - SCOPUS:84910002154
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 175
EP - 194
BT - Decision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings
A2 - Poovendran, Radha
A2 - Saad, Walid
PB - Springer Verlag
Y2 - 6 November 2014 through 7 November 2014
ER -