Eylem Seç
A Systems Science Perspective on Deception for Cybersecurity in the Internet of Things
Başlık:
A Systems Science Perspective on Deception for Cybersecurity in the Internet of Things
Yazar:
Pawlick, Jeffrey, author.
ISBN:
9780355992601
Yazar Ek Girişi:
Fiziksel Tanımlama:
1 electronic resource (227 pages)
Genel Not:
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Advisors: Quanyan Zhu Committee members: Zhong-Ping Jiang; Nasir Memon.
Özet:
Developments in sensing, computation, and machine learning have enabled revolutionary paradigms for networked systems. These paradigms include wireless sensor-actuator networks (WSAN), cyber-physical systems (CPS), and the Internet of things (IoT). To varying degrees, WSAN, CPS, and the IoT involve plug-n-play functionality, ubiquitous deployment, decentralized architecture, and control of physical processes. We refer to the general combination of these systems through the term IoCT: the Internet of controlled things.
Cybersecurity is a critical concern in the IoCT. Devices in the IoCT can cause large amounts of damage because they often control physical or even biological processes. Yet the IoCT lacks centralized infrastructure for strong security such as cryptography, its devices do not have common security standards, and innovation tends to take priority over extensive security testing. Traditional methods of security are strained to keep up with the dynamism and heterogeneity of the IoCT.
Information plays a central component in conflicts in cyberspace in general and in the IoCT in particular. Adversaries spend months performing reconnaissance on networks, searching for opportunities for attack. Spear phishing campaigns use inside knowledge about executives to make malicious emails appear legitimate. Nodes in mobile ad-hoc networks execute irrelevant queries for location-based services alongside relevant queries in order to protect the privacy of their users. In this dissertation, we study this informational aspect of cybersecurity in the IoCT through the lens of deception..
Deceptive and anti-deceptive technologies have been developed for various specific applications. But there is a significant need for a general, wholistic, and quantitative framework of deception. What are the various types of deception and counter-deception? How can they be conceptualized, quantified, and designed or mitigated? System sciences provide an ideal set of tools to develop such a framework of deception. In particular, game theory captures the strategic and self-interested nature of attackers and defenders in cybersecurity. Additionally, control theory can be used to quantify the physical impact of attack and defense strategies. In this dissertation, we develop models and design mechanisms for deception and counter-deception in the IoCT by composing tools from systems sciences such as feedback control, decision theory, signal processing, and optimization.
After introducing the IoCT and deception in Chapter 1, and systems science tools in Chapter 2, Chapter 3 develops a critical analysis of existing literature in game theory for defensive deception. We taxonomize defensive deception into the species of perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement. These species are rigorously defined using game-theoretic concepts. The taxonomy provides a menu of models that can be used for applied research. We find that most existing literature uses simple (Nash or Stackelberg) game models, does not study dynamic problems, and focuses mostly on cases of information symmetry. This dissertation addresses these gaps while analyzing problems in obfuscation for information privacy, attacker engagement for advanced persistent threats, honey-x for network security, and strategic trust for wearable health products.
First, Chapter 4 studies obfuscation for information privacy. We capture the interaction between a machine learning agent and a group of users through a dynamic and bi-level framework that quantifies accuracy using empirical risk minimization and privacy using differential privacy. This demands an expanded equilibrium concept called mean-field Stackelberg equilibrium. The chapter identifies necessary and sufficient conditions under which users adopt obfuscation in a cascading manner, and this incentivizes the learner to promise some level of privacy protection. We suggest that technologists need to be aware of these conditions, lest they develop techniques for obfuscation that render data useless but do not lead to more privacy protection.
Chapter 5 designs strategies for attacker engagement during advanced persistent threats. We consider an interaction in which a powerful defender detects an attacker and decides whether to eject him from the network or observe his behavior to learn more about his objectives. Using the combination of a Markov decision process on a continuous state space and a Stackelberg game, we ask how long the defender should wait before ejecting the attacker. We find a closed-form expression for the amount of information that the defender should gather before ejection, and we study the robustness of this threshold to worst-case attacker behavior...
Notlar:
School code: 1988
Tüzel Kişi Ek Girişi:
Mevcut:*
Yer Numarası | Demirbaş Numarası | Shelf Location | Lokasyon / Statüsü / İade Tarihi |
---|---|---|---|
XX(681723.1) | 681723-1001 | Proquest E-Tez Koleksiyonu | Arıyor... |
On Order
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
:
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.