A Game-Theoretic Approach for Alert Prioritization Aron Laszka, - - PowerPoint PPT Presentation

a game theoretic approach for alert prioritization
SMART_READER_LITE
LIVE PREVIEW

A Game-Theoretic Approach for Alert Prioritization Aron Laszka, - - PowerPoint PPT Presentation

A Game-Theoretic Approach for Alert Prioritization Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, Chao Yan, Bradley Malin Intrusion Detection Detection and mitigation of cyber-attacks is of crucial importance; however, attackers try to


slide-1
SLIDE 1

A Game-Theoretic Approach for Alert Prioritization

Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, 
 Chao Yan, Bradley Malin

slide-2
SLIDE 2

Intrusion Detection

  • Detection and mitigation of cyber-attacks is of crucial

importance; however, attackers try to stay stealthy

  • Intrusion Detection Systems (IDS)
  • generate alerts when they encounter suspicious activity
  • in order to be able to detect novel attacks,


they must also generate a large number of false alerts false alerts IDS attack alerts

≫ alert investigation 


budget B
 (available manpower, …)

Problem:
 Which alerts to investigate?

?

slide-3
SLIDE 3

Alert Prioritization

Alerts

?

slide-4
SLIDE 4

Alert Types

Alert types T t1 t2 t3 t4 Alerts

  • Alert types T
  • for example, matching different rules in

an intrusion detection system (e.g., Snort)

  • before investigating them, alerts of the

same type appear equally important

  • cumulative distribution Ft of the number
  • f false alerts of type t is known
  • Attacks A
  • for example, targeting certain machines
  • r using certain exploitation techniques
  • impact of attack a is La
  • probability of attack a raising an alert of

type t is Ra,t

slide-5
SLIDE 5

Alert Types

Alert types T t1 t2 t3 t4 Alerts Attacks probability Ra,t attack a1 attack a2

slide-6
SLIDE 6

Alert Prioritization Problem

Alert types T t1 t2 t3 t4 Alerts Naïve prioritization investigate (using
 budget B) attack

slide-7
SLIDE 7

Alert Prioritization Problem

Alert types T t1 t2 t3 t4 Alerts

  • rdering o1 ordering o2 ordering o3

Random choice …

Problem:
 What is the optimal probability distribution?

slide-8
SLIDE 8

Game-Theoretic Model

  • 1. Defender: selects an alert prioritization strategy p, which

is a probability distribution over possible orderings of T

  • 2. Adversary: 


selects an attack a from the set of possible attacks A

  • Players
  • Supposing that the defender uses ordering o ∈ T
  • probability of investigating type k (before exhausting budget B) is



 


  • probability of investigating attack a (before exhausting budget B) is

PI(o, k) = X

n: Cok +Pk

i=1 ni·Coi≤B

"

  • F ∗
  • k(nk) − F ∗
  • k(nk − 1)
  • #

· ≤

·

k−1

Y

i=1

(Foi(ni) − Foi(ni − 1)) # ∈ PD(o,a) = X Y Y X

ˆ T ⊆T

Y

t∈ ˆ T

Ra,t Y

t∈T \ ˆ T

(1 − Ra,t) PI ⇣

  • , min{i | oi ∈ ˆ

T} ⌘ (4)

slide-9
SLIDE 9

Optimal Alert Prioritization

  • Adversary’s gain and defender’s loss
  • adversary’s expected gain:
  • defender’s expected loss:
  • Solution concept: strong Stackelberg equilibrium
  • adversary’s best responses:
  • optimal prioritization strategy:

Challenge: finding an optimal probability distribution over a set of exponential size!

Theorem: Finding an optimal alert prioritization strategy is an NP-hard problem.

EG(p, a) = X

  • ∈O

po · (1 − PD(o, a)) · Ga − Ka, EL(p, a) = X

  • ∈O

po · (1 − PD(o, a)) · La.

BR(p) = argmax

a∈A

EG(p, a) min

p,a ∈ BR(p) EL(p, a)

slide-10
SLIDE 10

Computing Detection Probabilities

  • Probability of detecting an attack

PI(o, k) = X

n: Cok +Pk

i=1 ni·Coi≤B

"

  • F ∗
  • k(nk) − F ∗
  • k(nk − 1)
  • #

· ≤

·

k−1

Y

i=1

(Foi(ni) − Foi(ni − 1)) # ∈ PD(o,a) = X Y Y X

ˆ T ⊆T

Y

t∈ ˆ T

Ra,t Y

t∈T \ ˆ T

(1 − Ra,t) PI ⇣

  • , min{i | oi ∈ ˆ

T} ⌘ (4)

exponential number of terms

  • Dynamic programming algorithm

Algorithm 1 Computing PD(o, a) Input: prioritization game, prioritization o, attack a

1: for b = 0, 1, . . . , B do 2:

PD(o, a, |T|, b) Ra,o|T | · F ⇤

  • |T |
  • bb/Co|T |c 1
  • 3: end for

4: for i = |T| 1, . . . , 2, 1 do 5:

for b = 0, 1, . . . , B do

6:

PD(o, a, i, b) Ra,oi ·F ⇤

  • i(bb/Coic 1)+(1 Ra,oi)

bb/Coic

X

j=0

" (Foi(j) Foi(j 1))·PD(o, a, bj·Coi, i+1) #

7:

end for

8: end for 9: Return PD(o, a) := PD(o, a, 1, B)

slide-11
SLIDE 11

Finding an Optimal Alert Prioritization Strategy

  • Linear-programming based formulation
  • for each attack a ∈ A, solve
  • output the solution that attains the lowest loss

2 max

p

X

  • 2O

po · PD(o, a) subject to 8 a0 2 A : X

  • 2O

po · D(o, a0) ∆ (Ka0) Algorithm 2 Greedy Column Generation Input: prioritization game, reduced cost function ¯ c

1: o ; 2: while 9 t 2 T \ o do 3:

  • o + argmaxt2T \o ¯

c(o + t)

4: end while 5: Return o

  • Polynomial-time column generation approach

X where D(o, a0) = [(1PD(o, a))Ga(1PD(o, a0))Ga0] . Once each is solved, we

  • and ∆ (Ka0) = Ka Ka0.

can choose the solution p⇤

where

¯ c(o) = PD(o, a) + X

a02A

y( ¯ O, a0)D(o, a0)

where (i.e., reduced cost function) exponential number

  • f possible orderings

Problem: Finding an improving column (i.e., ordering) is an NP-hard problem.

slide-12
SLIDE 12

Numerical Results - Synthetic Dataset

2 3 4 5 6 7 10−2 10−1 100 101 102 103 Optimal Greedy Column Generation 2 3 4 5 6 7 0.2 0.4 0.6 0.8 Optimal Greedy Column Generation

Running Time Defender’s Loss

Defender’s expected loss Running time [s] Number of attack and alert types Number of attack and alert types Ka = 0, Ct = 1, B = 5|T|, Da and Ga were drawn at random from [0.5, 1], each Ra,t is either 0 (with probability 1/3) or drawn at random from [0, 1], and every Ft has a Poisson distribution whose mean is drawn at random from [5, 15].

slide-13
SLIDE 13

Real-World Dataset: 
 Electronic Medical Record System Alerts

  • Access logs from the electronic medical record (EMR)

system in place at Vanderbilt University Medical Center

  • integrated with human-resources data to document medical department

affiliation, employment information, and home addresses patient 
 record 1 patient 
 record 2 patient record 3

Alert types T

  • 1. same surname
  • 2. coworkers
  • 3. home within 0.25 miles
  • 4. … 5. … 6. …

Explanation Based
 Auditing System [1]

[1] Fabbri, D., and LeFevre, K. 2013. Explaining accesses to electronic medical records using diagnosis information. Journal of the American Medical Informatics Association 20(1):52–60.

Attacks A ~ potential misuses employees

slide-14
SLIDE 14

Numerical Results - Real-World Dataset

0.2 0.4 0.6 0.8 1 1.2 0.2 0.4 0.6 0.8 1 Optimal Greedy Column Generation

Defender’s Loss

Defender’s expected loss Defender’s budget

  • Data collected from five

consecutive weeks of access logs from 2016

  • 8,481,767 accesses made

by 14,531 users to 161,426 patient records, leading to a total of 863,989 alerts

  • Approximated the

distributions of false alerts using Poisson distributions

  • In order to find optimal

strategies, we restricted the alerts to 12 randomly selected patients

·104

slide-15
SLIDE 15

Conclusion & Future Work

  • Prioritization of alerts is of crucial importance to the

effectiveness of intrusion and misuse detection

  • Result highlights
  • introduced first model of alert prioritization against strategic adversaries
  • showed that finding an optimal prioritization strategy is NP-hard
  • proposed an efficient column-generation based approach
  • evaluated numerically using synthetic and real-world datasets
  • Future work
  • constant approximation ratio algorithms
  • modeling multiple adversary types as a Bayesian Stackelberg game
slide-16
SLIDE 16

Thank you for your attention! Questions?