Formulating Cyber-Security as Convex Optimization Problems
Author(s) -
Kyriakos G. Vamvoudakis,
João P. Hespanha,
Richard A. Kemmerer,
Giovanni Vigna
Publication year - 2013
Publication title -
lecture notes in control and information sciences
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.173
H-Index - 49
eISSN - 1610-7411
pISSN - 0170-8643
DOI - 10.1007/978-3-319-01159-2_5
Subject(s) - identification (biology) , computer science , computer security , probabilistic logic , optimization problem , hacker , state (computer science) , a priori and a posteriori , operations research , engineering , artificial intelligence , algorithm , philosophy , epistemology , botany , biology
Mission-centric cyber-security analysts require a complete overview and understanding of the state of a mission and any potential threats to their completion. To facilitate this, we propose optimization based algorithms that can be used to predict in real-time how an attacker may try to compromise a cyber-mission with a limited amount of resources, based on a model that takes into account potential damage to the mission and probabilistic uncertainty. Two different optimization schemes are considered: one where all the mission data is known a priori to the attacker and another where system identification and a moving horizon optimization is used to produce the estimates based on historical data. Our schemes are compared with real attacks carried our by human players in the 2011 international Capture The Flag (iCTF) hacking competition.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom