SlideShare a Scribd company logo
1 of 31
Download to read offline
Duplicity Games for Deception Design With an
Application to Insider Threat Mitigation
Linan Huang and Quanyan Zhu
2022 INFORMS Annual Conference
October 17, 2022
Source: https://www.secureworld.io/industry-news/tesla-hacker-charges-arrested
Failure of Boundary Defense
Insider Threats
Challenge 1: Perimeter defense does not work.
Challenges of Insider Threats
Solution: Zero-Trust architecture
Challenge 2: Asymmetric information
Challenges of Insider Threats
Solution: Cyber deception
Challenge 3: False positive from negligent legitimate users
Challenges of Insider Threats
Solution: Compliance and mechanism design
Game between a defender and an unknown user
State 𝑥 ∈ 𝑋
Feature pattern 𝑠 ∈ 𝑆
• Protocols
• Ports
• Response time
• Error response
𝜋1 1 − 𝜋1 1 − 𝜋2
𝜋2
𝑏 1 − 𝑏
Feature
Generator 𝜋
𝑠1 𝑠2 𝑠1 𝑠2
Incorporating Cyber Deception into the Game Model
𝜋1 1 − 𝜋1 1 − 𝜋2
𝜋2
𝑏 1 − 𝑏
User’s
posterior
belief 𝑏𝑝(𝑠1) 1 − 𝑏𝑝(𝑠1) 𝑏𝑝
(𝑠2) 1 − 𝑏𝑝(𝑠2)
User’s
posterior
belief 𝑏𝑝
(𝑠1) 1 − 𝑏𝑝(𝑠1)
User’s action
𝑎 ∈ 𝐴
User’s utility
𝑣𝑈(𝑡𝑦𝑝𝑒, 𝑠𝑡𝑎𝑡𝑒, 𝑎𝑐𝑡𝑖𝑜𝑛)
User’s type
𝜃 ∈ Θ
−$$ $$
−$ $$$
𝜋1 1 − 𝜋1 1 − 𝜋2
𝜋2
𝑏 1 − 𝑏
𝑏𝑝(𝑠1) 1 − 𝑏𝑝(𝑠1) 𝑏𝑝(𝑠2) 1 − 𝑏𝑝
(𝑠2)
−$$ $$
−$ $$$
…
Feature Generator
𝜋
Belief Manipulator
𝑏, 𝑏𝑈
Incentive Modulator
𝑐
There is a need for a theory for Cyber Deception Mechanism Design.
Theory can go beyond the design of generator.
• Belief/Trust Manipulator: e.g., changing honeypot percentage
• Feature Generator: e.g., configuring honeypots and normal servers
• Incentive Modulator: e.g., using multi-step authentication
How to Design the Generator?
Duplicity Game for Mechanism Design
Cyber deception (with focus on honeypots):
Evasion risk [Spitzner 2003], Intelligence [Wagener et al. 2009, 2011], Engagement [Pawlick et
al.19’], Detection risk [Dowling et al. 2019], Resource consumption [Akiyama et al. 2012], False
positives [Qassrawi & Zhang 2010] , Strategic design [Pawlick et al. 2021], etc.
Compliance and mechanism design:
Insider Threat Mitigation Guide [CISA 2020]; The Critical Role of Positive Incentives for Reducing
Insider Threats [CERT/CMU 2016]
Mitigating inadvertent insider threats with incentives [Liu et al. 2009]; Compliance control [Casey, et
al. 2015], ZETAR [Huang and Zhu 2022]; etc.
Literature
Generator Design Problem: Defender’s Problem
The defender designs a utility-maximizing generator so that the user has no
incentive to deviate from the recommendation.
Dual Formulation: User’s Problem
The user minimizes his expected effort to satisfy the defender’s security objective.
User’s action
𝑎 ∈ 𝐴
User’s type
𝜃 ∈ Θ
K actions and M types 𝐾𝑀 possible security policies
Only 𝜒(𝐾, 𝑀, 𝑁) are enforceable.
−$$ $$
−$ $$$
Always exists one optimal generator that only relies on 𝑁 security policies.
Feasibility of Generators: Enforceable Policies
• Incentive Threshold (IT): Uncontrollable if the majority of insiders are adversarial.
• Deterrence Threshold (DT): Uncontrollable if there is an insufficient number of honeypots.
Incentive
Threshold
Deterrence
Threshold
How does the percentage or probability of honeypots and (negligent) insiders
affect defender’s utility?
If < IT && <DT, then the design of the generator is insufficient to deter an insider.
Zero Trust Margin → Cannot be incentivized
Deterrence Capacity
Defender’s utility structure = user’s utility structure
Defender’s utility structure = -user’s utility structure
No deception needed: Reveal full information
Maximum deception needed: Reveal zero information
Manageability of Incentive Modulator: Designing the Reward
No deception needed: Reveal full information
Maximum deception needed: Reveal zero information
Defender’s utility structure = 𝜌𝑠 user’s utility structure + 𝜌𝑑
Only the sign of 𝜌𝑠 matters.
𝜌𝑠 > 0
𝜌𝑠 < 0
Manageability under Linearly dependent utility structure
Principles for Joint Design of GMM
Extension to Multi-Dimensional Mechanism Designs
The defender can design reward independently.
Separation Principle
Design Information + Trust = Design Trust
Equivalence Principle
Fast Learning for Finite-Step Mitigation
• Duplicity game for designing cognitive honeypots
• Strategic and incentive-compatible Insider threat mitigation
• Enforceability, manageability, and deterrence
• Online and learning-based implementation
Conclusions
Huang, L. and Zhu, Q., 2021. Duplicity games for deception design with an application to insider threat
mitigation. IEEE Transactions on Information Forensics and Security, 16, pp.4843-4856.
Five Generations of Security Paradigms
1G-SP: Laissez-Faire Security
2G-SP: Perimeter Security
3G-SP: Reactive Security
4G-SP: Proactive Security
5G-SP: Federated Security
Five Generations of Security Paradigms (SPs)
4G-SP: Proactive Security 5G-SP: Federated Security
Emergence of AI-Powered Attacks
Incorporate AI and system science to develop cognitive honeypots for 5G-SP
Consolidation of Strategic, Proactive,
and Autonomous Defense
Contact: Quanyan Zhu
Email: qz494@nyu.edu

More Related Content

Similar to Duplicity Games and Cyber Deception Design

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajanShwetank Jayaswal
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...IRJET Journal
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business casepmcbrideva1
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Network security and cryptography 2018
Network security and cryptography  2018  Network security and cryptography  2018
Network security and cryptography 2018 Action Mojakwe
 
Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.Thoughtworks
 

Similar to Duplicity Games and Cyber Deception Design (20)

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Network security and cryptography 2018
Network security and cryptography  2018  Network security and cryptography  2018
Network security and cryptography 2018
 
Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.
 

Recently uploaded

Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 

Recently uploaded (20)

Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 

Duplicity Games and Cyber Deception Design

  • 1. Duplicity Games for Deception Design With an Application to Insider Threat Mitigation Linan Huang and Quanyan Zhu 2022 INFORMS Annual Conference October 17, 2022
  • 2.
  • 3.
  • 4.
  • 5.
  • 7. Failure of Boundary Defense Insider Threats
  • 8. Challenge 1: Perimeter defense does not work. Challenges of Insider Threats Solution: Zero-Trust architecture
  • 9. Challenge 2: Asymmetric information Challenges of Insider Threats Solution: Cyber deception
  • 10. Challenge 3: False positive from negligent legitimate users Challenges of Insider Threats Solution: Compliance and mechanism design
  • 11. Game between a defender and an unknown user
  • 12. State 𝑥 ∈ 𝑋 Feature pattern 𝑠 ∈ 𝑆 • Protocols • Ports • Response time • Error response 𝜋1 1 − 𝜋1 1 − 𝜋2 𝜋2 𝑏 1 − 𝑏 Feature Generator 𝜋 𝑠1 𝑠2 𝑠1 𝑠2 Incorporating Cyber Deception into the Game Model
  • 13. 𝜋1 1 − 𝜋1 1 − 𝜋2 𝜋2 𝑏 1 − 𝑏 User’s posterior belief 𝑏𝑝(𝑠1) 1 − 𝑏𝑝(𝑠1) 𝑏𝑝 (𝑠2) 1 − 𝑏𝑝(𝑠2)
  • 14. User’s posterior belief 𝑏𝑝 (𝑠1) 1 − 𝑏𝑝(𝑠1) User’s action 𝑎 ∈ 𝐴 User’s utility 𝑣𝑈(𝑡𝑦𝑝𝑒, 𝑠𝑡𝑎𝑡𝑒, 𝑎𝑐𝑡𝑖𝑜𝑛) User’s type 𝜃 ∈ Θ −$$ $$ −$ $$$
  • 15. 𝜋1 1 − 𝜋1 1 − 𝜋2 𝜋2 𝑏 1 − 𝑏 𝑏𝑝(𝑠1) 1 − 𝑏𝑝(𝑠1) 𝑏𝑝(𝑠2) 1 − 𝑏𝑝 (𝑠2) −$$ $$ −$ $$$ … Feature Generator 𝜋 Belief Manipulator 𝑏, 𝑏𝑈 Incentive Modulator 𝑐
  • 16. There is a need for a theory for Cyber Deception Mechanism Design. Theory can go beyond the design of generator. • Belief/Trust Manipulator: e.g., changing honeypot percentage • Feature Generator: e.g., configuring honeypots and normal servers • Incentive Modulator: e.g., using multi-step authentication How to Design the Generator?
  • 17. Duplicity Game for Mechanism Design
  • 18. Cyber deception (with focus on honeypots): Evasion risk [Spitzner 2003], Intelligence [Wagener et al. 2009, 2011], Engagement [Pawlick et al.19’], Detection risk [Dowling et al. 2019], Resource consumption [Akiyama et al. 2012], False positives [Qassrawi & Zhang 2010] , Strategic design [Pawlick et al. 2021], etc. Compliance and mechanism design: Insider Threat Mitigation Guide [CISA 2020]; The Critical Role of Positive Incentives for Reducing Insider Threats [CERT/CMU 2016] Mitigating inadvertent insider threats with incentives [Liu et al. 2009]; Compliance control [Casey, et al. 2015], ZETAR [Huang and Zhu 2022]; etc. Literature
  • 19. Generator Design Problem: Defender’s Problem The defender designs a utility-maximizing generator so that the user has no incentive to deviate from the recommendation.
  • 20. Dual Formulation: User’s Problem The user minimizes his expected effort to satisfy the defender’s security objective.
  • 21. User’s action 𝑎 ∈ 𝐴 User’s type 𝜃 ∈ Θ K actions and M types 𝐾𝑀 possible security policies Only 𝜒(𝐾, 𝑀, 𝑁) are enforceable. −$$ $$ −$ $$$ Always exists one optimal generator that only relies on 𝑁 security policies. Feasibility of Generators: Enforceable Policies
  • 22. • Incentive Threshold (IT): Uncontrollable if the majority of insiders are adversarial. • Deterrence Threshold (DT): Uncontrollable if there is an insufficient number of honeypots. Incentive Threshold Deterrence Threshold How does the percentage or probability of honeypots and (negligent) insiders affect defender’s utility?
  • 23. If < IT && <DT, then the design of the generator is insufficient to deter an insider. Zero Trust Margin → Cannot be incentivized Deterrence Capacity
  • 24. Defender’s utility structure = user’s utility structure Defender’s utility structure = -user’s utility structure No deception needed: Reveal full information Maximum deception needed: Reveal zero information Manageability of Incentive Modulator: Designing the Reward
  • 25. No deception needed: Reveal full information Maximum deception needed: Reveal zero information Defender’s utility structure = 𝜌𝑠 user’s utility structure + 𝜌𝑑 Only the sign of 𝜌𝑠 matters. 𝜌𝑠 > 0 𝜌𝑠 < 0 Manageability under Linearly dependent utility structure
  • 26. Principles for Joint Design of GMM Extension to Multi-Dimensional Mechanism Designs The defender can design reward independently. Separation Principle Design Information + Trust = Design Trust Equivalence Principle
  • 27. Fast Learning for Finite-Step Mitigation
  • 28. • Duplicity game for designing cognitive honeypots • Strategic and incentive-compatible Insider threat mitigation • Enforceability, manageability, and deterrence • Online and learning-based implementation Conclusions Huang, L. and Zhu, Q., 2021. Duplicity games for deception design with an application to insider threat mitigation. IEEE Transactions on Information Forensics and Security, 16, pp.4843-4856.
  • 29. Five Generations of Security Paradigms 1G-SP: Laissez-Faire Security 2G-SP: Perimeter Security 3G-SP: Reactive Security 4G-SP: Proactive Security 5G-SP: Federated Security Five Generations of Security Paradigms (SPs)
  • 30. 4G-SP: Proactive Security 5G-SP: Federated Security Emergence of AI-Powered Attacks Incorporate AI and system science to develop cognitive honeypots for 5G-SP Consolidation of Strategic, Proactive, and Autonomous Defense