Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph

Hua Wu,Yu Gu,Guang Cheng,Yuyang Zhou
DOI: https://doi.org/10.1145/3403746.3403897
2020-01-01
Abstract:The theoretical study of cyber deception technology often focuses on the analysis of specific defense technologies, and most researches are limited to the single-level qualitative measurement, which cannot be utilized in the complex environment. In this paper, to quantify the effectiveness of cyber deception comprehensively and reasonably, a method is proposed based on a dynamic Bayesian attack graph. By analyzing the capability of attackers, the Bayesian attack graph is established based on the dependence of network resources and vulnerability factors. Then we verify the consistency of host nodes in the project based on network features, device fingerprints, and file attributes, and update the Bayesian attack graph with network attack-defense events. Finally, in combination with the common vulnerability scoring system (CVSS) metrics, the concealment and effectiveness indexes are given to evaluate the cyber deception's performance. Experiments show that our method is feasible for the attack-defense adversarial network environment, which is beneficial for the defender to formulate the optimal deception strategy according to the current situation of attack-defense events.
What problem does this paper attempt to address?