A Game Theoretic Analysis of Cyber Threats

Publications: Contribution to bookContribution to proceedingsPeer Reviewed

Abstract

Cyber threat analysis is crucial to securing modern IT systems. In the ongoing project described here a strictly mathematical method for threat analysis is sketched. The threat landscape between an attacker (hacker) and a defender (system owner) is modeled along the formalisms of stochastic game theory, thus opening the way for a rigorous formal analysis. The key benefit of the project is its applicability to real-world situations. Therefore, the information about possible attack and defense actions is taken from several proven data sources resulting in a large number of actions (173 attack actions and 115 defense actions). We present an adaptation of the so-called Princess-and-Monster game to model the problem. Various problems with the formalization are discussed. To keep the model manageable despite the claim of practicality, it is applied only to specific scenarios mimicking real-world situations.
Original languageEnglish
Title of host publicationProceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP
Place of PublicationCham
PublisherSpringer
Pages706-713
ISBN (Electronic)978-989-758-624-8
DOIs
Publication statusPublished - 2023

Austrian Fields of Science 2012

  • 202043 Network security

Keywords

  • Cyber Threat Analysis, Game Theory

Cite this