a game theoretic approach for alert prioritization
play

A Game-Theoretic Approach for Alert Prioritization Aron Laszka, - PowerPoint PPT Presentation

A Game-Theoretic Approach for Alert Prioritization Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, Chao Yan, Bradley Malin Intrusion Detection Detection and mitigation of cyber-attacks is of crucial importance; however, attackers try to


  1. A Game-Theoretic Approach for Alert Prioritization Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, 
 Chao Yan, Bradley Malin

  2. Intrusion Detection • Detection and mitigation of cyber-attacks is of crucial importance; however, attackers try to stay stealthy • Intrusion Detection Systems (IDS) • generate alerts when they encounter suspicious activity • in order to be able to detect novel attacks, 
 they must also generate a large number of false alerts ? ≫ alert investigation 
 budget B 
 attack alerts IDS (available manpower, …) false alerts Problem: 
 Which alerts to investigate?

  3. Alert Prioritization Alerts ?

  4. Alert Types • Alert types T Alerts • for example, matching di ff erent rules in an intrusion detection system (e.g., Snort) t 1 • before investigating them, alerts of the same type appear equally important t 2 • cumulative distribution F t of the number of false alerts of type t is known Alert types T t 3 • Attacks A • for example, targeting certain machines or using certain exploitation techniques t 4 • impact of attack a is L a • probability of attack a raising an alert of type t is R a,t

  5. Alert Types Alerts Attacks t 1 t 2 attack a 1 Alert types T t 3 attack a 2 t 4 probability R a,t

  6. Alert Prioritization Problem Alerts Naïve prioritization t 1 investigate (using 
 budget B ) t 2 Alert types T t 3 attack t 4

  7. Alert Prioritization Problem Random choice Alerts ordering o 1 ordering o 2 ordering o 3 t 1 t 2 … Alert types T t 3 t 4 Problem: 
 What is the optimal probability distribution?

  8. 
 
 Game-Theoretic Model • Players 1. Defender: selects an alert prioritization strategy p , which is a probability distribution over possible orderings of T 2. Adversary: 
 selects an attack a from the set of possible attacks A • Supposing that the defender uses ordering o ∈ T • probability of investigating type k (before exhausting budget B ) is 
 · ≤ " k − 1 # X Y F ∗ o k ( n k ) − F ∗ � � PI ( o , k ) = o k ( n k − 1) · ( F o i ( n i ) − F o i ( n i − 1)) n : i =1 C ok + P k i =1 n i · C oi ≤ B # • probability of investigating attack a (before exhausting budget B ) is ∈ ⇣ ⌘ X Y Y o , min { i | o i ∈ ˆ PD ( o ,a ) = (1 − R a,t ) PI T } R a,t ˆ t ∈ ˆ t ∈ T \ ˆ X Y Y T ⊆ T T T (4)

  9. Optimal Alert Prioritization • Adversary’s gain and defender’s loss • adversary’s expected gain: X EG ( p , a ) = p o · (1 − PD ( o , a )) · G a − K a , o ∈ O • defender’s expected loss: X EL ( p , a ) = p o · (1 − PD ( o , a )) · L a . o ∈ O • Solution concept: strong Stackelberg equilibrium • adversary’s best responses: BR ( p ) = argmax EG ( p , a ) a ∈ A • optimal prioritization strategy : p ,a ∈ BR ( p ) EL ( p , a ) min Challenge: finding an optimal probability distribution over a set of exponential size! Theorem : Finding an optimal alert prioritization strategy is an NP-hard problem.

  10. Computing Detection Probabilities • Probability of detecting an attack · ≤ " k − 1 # X Y F ∗ o k ( n k ) − F ∗ � � PI ( o , k ) = o k ( n k − 1) · ( F o i ( n i ) − F o i ( n i − 1)) n : i =1 C ok + P k i =1 n i · C oi ≤ B ∈ # ⇣ ⌘ X Y Y o , min { i | o i ∈ ˆ PD ( o ,a ) = (1 − R a,t ) PI T } R a,t ˆ t ∈ ˆ t ∈ T \ ˆ X Y Y T ⊆ T T T exponential number of terms (4) • Dynamic programming algorithm Algorithm 1 Computing PD ( o , a ) Input: prioritization game, prioritization o , attack a 1: for b = 0 , 1 , . . . , B do PD ( o , a, | T | , b ) R a,o | T | · F ⇤ � � b b/C o | T | c � 1 2: o | T | 3: end for 4: for i = | T | � 1 , . . . , 2 , 1 do for b = 0 , 1 , . . . , B do 5: b b/C oi c " # X PD ( o , a, i, b ) R a,o i · F ⇤ o i ( b b/C o i c � 1)+(1 � R a,o i ) ( F o i ( j ) � F o i ( j � 1)) · PD ( o , a, b � j · C o i , i +1) 6: j =0 end for 7: 8: end for 9: Return PD ( o , a ) := PD ( o , a, 1 , B )

  11. Finding an Optimal Alert Prioritization Strategy • Linear-programming based formulation X 2 • for each attack a ∈ A , solve where X max p o · PD ( o , a ) where D ( o, a 0 ) = [(1 � PD ( o , a )) G a � (1 � PD ( o , a 0 )) G a 0 ] 0 � p o 2 O . Once each is solved, we and ∆ ( K a 0 ) = K a � K a 0 . subject to can choose the solution p ⇤ 8 a 0 2 A : exponential number X p o · D ( o , a 0 ) � ∆ ( K a 0 ) of possible orderings o 2 O • output the solution that attains the lowest loss Problem : Finding an improving column (i.e., ordering) is an NP-hard problem. • Polynomial-time column generation approach Algorithm 2 Greedy Column Generation Input: prioritization game, reduced cost function ¯ c 1: o ; where 2: while 9 t 2 T \ o do X y ( ¯ O, a 0 ) D ( o , a 0 ) c ( o ) = PD ( o , a ) + ¯ o o + argmax t 2 T \ o ¯ c ( o + t ) 3: a 0 2 A 4: end while (i.e., reduced cost function) 5: Return o

  12. Numerical Results - Synthetic Dataset Defender’s Loss Running Time 0 . 8 10 3 Optimal Defender’s expected loss Greedy Column Generation 10 2 Running time [s] 0 . 6 10 1 0 . 4 10 0 10 − 1 0 . 2 10 − 2 Optimal Greedy Column Generation 0 2 3 4 5 6 7 2 3 4 5 6 7 Number of attack and alert types Number of attack and alert types K a = 0 , C t = 1 , B = 5| T | , D a and G a were drawn at random from [0.5, 1] , each R a,t is either 0 (with probability 1/3 ) or drawn at random from [0, 1] , and every F t has a Poisson distribution whose mean is drawn at random from [5, 15] .

  13. Real-World Dataset: 
 Electronic Medical Record System Alerts • Access logs from the electronic medical record (EMR) system in place at Vanderbilt University Medical Center • integrated with human-resources data to document medical department a ffi liation, employment information, and home addresses patient 
 1. same surname record 1 employees 2. coworkers patient 
 record 2 3. home within 0.25 miles patient 4. … 5. … 6. … record 3 … Explanation Based 
 Alert types T Attacks A ~ potential misuses Auditing System [1] [1] Fabbri, D., and LeFevre, K. 2013. Explaining accesses to electronic medical records using diagnosis information. Journal of the American Medical Informatics Association 20(1):52–60.

  14. Numerical Results - Real-World Dataset • Data collected from five Defender’s Loss consecutive weeks of access logs from 2016 1 • 8,481,767 accesses made Defender’s expected loss 0 . 8 by 14,531 users to 161,426 patient records, leading to 0 . 6 a total of 863,989 alerts • Approximated the 0 . 4 distributions of false alerts 0 . 2 using Poisson distributions Optimal • In order to find optimal 0 Greedy Column Generation strategies, we restricted 0 0 . 2 0 . 4 0 . 6 0 . 8 1 1 . 2 the alerts to 12 randomly · 10 4 Defender’s budget selected patients

  15. Conclusion & Future Work • Prioritization of alerts is of crucial importance to the effectiveness of intrusion and misuse detection • Result highlights • introduced first model of alert prioritization against strategic adversaries • showed that finding an optimal prioritization strategy is NP-hard • proposed an e ffi cient column-generation based approach • evaluated numerically using synthetic and real-world datasets • Future work • constant approximation ratio algorithms • modeling multiple adversary types as a Bayesian Stackelberg game

  16. Thank you for your attention! Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend