FlipThem: Modeling targeted attacks with FlipIt for multiple resources

Aron Laszka, Gabor Horvath, Mark Felegyhazi, Levente Buttyán

Research output: Chapter in Book/Report/Conference proceedingConference contribution

55 Scopus citations

Abstract

Recent high-profile targeted attacks showed that even the most secure and secluded networks can be compromised by motivated and resourceful attackers, and that such a system compromise may not be immediately detected by the system owner. Researchers at RSA proposed the FlipIt game to study the impact of such stealthy takeovers. In the basic FlipIt game, an attacker and a defender fight over a single resource; in practice, however, systems typically consist of multiple resources that can be targeted. In this paper, we present FlipThem, a generalization of FlipIt to multiple resources. To formulate the players’ goals and study their best strategies, we introduce two control models: in the AND model, the attacker has to compromise all resources in order to take over the entire system, while in the OR model, she has to compromise only one. Our analytical and numerical results provide practical recommendations for defenders.

Original languageEnglish (US)
Title of host publicationDecision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings
EditorsRadha Poovendran, Walid Saad
PublisherSpringer Verlag
Pages175-194
Number of pages20
ISBN (Electronic)9783319126005
DOIs
StatePublished - 2014
Event5th International Conference on Decision and GameTheory for Security, GameSec 2014 - Los Angeles, United States
Duration: Nov 6 2014Nov 7 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8840
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Decision and GameTheory for Security, GameSec 2014
Country/TerritoryUnited States
CityLos Angeles
Period11/6/1411/7/14

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'FlipThem: Modeling targeted attacks with FlipIt for multiple resources'. Together they form a unique fingerprint.

Cite this