File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

최진혁

Choi, Jin Hyuk
Mathematical Finance Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Security defense against long-term and stealthy cyberattacks

Author(s)
Han, KookyoungChoi, Jin HyukChoi, YunsikLee, Gene MooWhinston, Andrew B.
Issued Date
2023-03
DOI
10.1016/j.dss.2022.113912
URI
https://scholarworks.unist.ac.kr/handle/201301/61978
Citation
DECISION SUPPORT SYSTEMS, v.166, pp.113912
Abstract
Modern cyberattacks such as advanced persistent threats have become sophisticated. Hackers can stay undetected for an extended time and defenders do not have sufficient countermeasures to prevent advanced cyberattacks. Reflecting on this phenomenon, we propose a game-theoretic model to analyze strategic decisions made by a hacker and a defender in equilibrium. In our game model, the hacker launches stealthy cyberattacks for a long time and the defender decides when to disable a suspicious user based on noisy observations of the user’s activities. Damages caused by the hacker can be enormous if the defender does not immediately ban a suspicious user under certain circumstances, which can explain the emerging sophisticated cyberattacks with detrimental consequences. Our model also predicts that the hacker may opt to be behavioral to avoid worst cases. This is because behavioral cyberattacks are less threatening and the defender decides not to immediately block a suspicious user to reduce cost of false detection.
Publisher
Elsevier BV
ISSN
0167-9236
Keyword (Author)
Dynamic gameFalse detectionPersistent threatsSecurity automationStealthy cyberattacks
Keyword
INFORMATION SECURITYRISKSERVICESSYSTEMSIMPACTCOMPETITIONMARKETS

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.