際際滷

際際滷Share a Scribd company logo
Duplicity Games for Deception Design With an
Application to Insider Threat Mitigation
Linan Huang and Quanyan Zhu
2022 INFORMS Annual Conference
October 17, 2022
Koopman Prize Presentation
Koopman Prize Presentation
Koopman Prize Presentation
Koopman Prize Presentation
Source: https://www.secureworld.io/industry-news/tesla-hacker-charges-arrested
Failure of Boundary Defense
Insider Threats
Challenge 1: Perimeter defense does not work.
Challenges of Insider Threats
Solution: Zero-Trust architecture
Challenge 2: Asymmetric information
Challenges of Insider Threats
Solution: Cyber deception
Challenge 3: False positive from negligent legitimate users
Challenges of Insider Threats
Solution: Compliance and mechanism design
Game between a defender and an unknown user
State   
Feature pattern   
 Protocols
 Ports
 Response time
 Error response
1 1  1 1  2
2
 1  
Feature
Generator 
1 2 1 2
Incorporating Cyber Deception into the Game Model
1 1  1 1  2
2
 1  
Users
posterior
belief (1) 1  (1) 
(2) 1  (2)
Users
posterior
belief 
(1) 1  (1)
Users action
  
Users utility
p($, $$, $)
Users type
  
$$ $$
$ $$$
1 1  1 1  2
2
 1  
(1) 1  (1) (2) 1  
(2)
$$ $$
$ $$$

Feature Generator

Belief Manipulator
, 
Incentive Modulator
There is a need for a theory for Cyber Deception Mechanism Design.
Theory can go beyond the design of generator.
 Belief/Trust Manipulator: e.g., changing honeypot percentage
 Feature Generator: e.g., configuring honeypots and normal servers
 Incentive Modulator: e.g., using multi-step authentication
How to Design the Generator?
Duplicity Game for Mechanism Design
Cyber deception (with focus on honeypots):
Evasion risk [Spitzner 2003], Intelligence [Wagener et al. 2009, 2011], Engagement [Pawlick et
al.19], Detection risk [Dowling et al. 2019], Resource consumption [Akiyama et al. 2012], False
positives [Qassrawi & Zhang 2010] , Strategic design [Pawlick et al. 2021], etc.
Compliance and mechanism design:
Insider Threat Mitigation Guide [CISA 2020]; The Critical Role of Positive Incentives for Reducing
Insider Threats [CERT/CMU 2016]
Mitigating inadvertent insider threats with incentives [Liu et al. 2009]; Compliance control [Casey, et
al. 2015], ZETAR [Huang and Zhu 2022]; etc.
Literature
Generator Design Problem: Defenders Problem
The defender designs a utility-maximizing generator so that the user has no
incentive to deviate from the recommendation.
Dual Formulation: Users Problem
The user minimizes his expected effort to satisfy the defenders security objective.
Users action
  
Users type
  
K actions and M types 情 possible security policies
Only (, , ) are enforceable.
$$ $$
$ $$$
Always exists one optimal generator that only relies on  security policies.
Feasibility of Generators: Enforceable Policies
 Incentive Threshold (IT): Uncontrollable if the majority of insiders are adversarial.
 Deterrence Threshold (DT): Uncontrollable if there is an insufficient number of honeypots.
Incentive
Threshold
Deterrence
Threshold
How does the percentage or probability of honeypots and (negligent) insiders
affect defenders utility?
If < IT && <DT, then the design of the generator is insufficient to deter an insider.
Zero Trust Margin  Cannot be incentivized
Deterrence Capacity
Defenders utility structure = users utility structure
Defenders utility structure = -users utility structure
No deception needed: Reveal full information
Maximum deception needed: Reveal zero information
Manageability of Incentive Modulator: Designing the Reward
No deception needed: Reveal full information
Maximum deception needed: Reveal zero information
Defenders utility structure =  users utility structure + 
Only the sign of  matters.
 > 0
 < 0
Manageability under Linearly dependent utility structure
Principles for Joint Design of GMM
Extension to Multi-Dimensional Mechanism Designs
The defender can design reward independently.
Separation Principle
Design Information + Trust = Design Trust
Equivalence Principle
Fast Learning for Finite-Step Mitigation
 Duplicity game for designing cognitive honeypots
 Strategic and incentive-compatible Insider threat mitigation
 Enforceability, manageability, and deterrence
 Online and learning-based implementation
Conclusions
Huang, L. and Zhu, Q., 2021. Duplicity games for deception design with an application to insider threat
mitigation. IEEE Transactions on Information Forensics and Security, 16, pp.4843-4856.
Five Generations of Security Paradigms
1G-SP: Laissez-Faire Security
2G-SP: Perimeter Security
3G-SP: Reactive Security
4G-SP: Proactive Security
5G-SP: Federated Security
Five Generations of Security Paradigms (SPs)
4G-SP: Proactive Security 5G-SP: Federated Security
Emergence of AI-Powered Attacks
Incorporate AI and system science to develop cognitive honeypots for 5G-SP
Consolidation of Strategic, Proactive,
and Autonomous Defense
Contact: Quanyan Zhu
Email: qz494@nyu.edu

More Related Content

Similar to Koopman Prize Presentation (20)

Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
srinjoy221001102046
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Techno India University
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
bijejournal
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
2024-Cybersecurity-Outlook for all engineering students
2024-Cybersecurity-Outlook for all engineering students2024-Cybersecurity-Outlook for all engineering students
2024-Cybersecurity-Outlook for all engineering students
SandipHalder17
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
MITRE ATT&CK
Clickjacking Attack: Hijacking Users Click
Clickjacking Attack: Hijacking Users ClickClickjacking Attack: Hijacking Users Click
Clickjacking Attack: Hijacking Users Click
Eswar Publications
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
Naveed Ahmed Siddiqui
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
Shwetank Jayaswal
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
IRJET Journal
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
SecPod
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
SecPod
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
Ciberseguridad ingl辿s ppt trabajo PDF ingl辿s
Ciberseguridad ingl辿s ppt trabajo PDF ingl辿sCiberseguridad ingl辿s ppt trabajo PDF ingl辿s
Ciberseguridad ingl辿s ppt trabajo PDF ingl辿s
lucylloclla525
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
pmcbrideva1
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
srinjoy221001102046
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Techno India University
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
bijejournal
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
2024-Cybersecurity-Outlook for all engineering students
2024-Cybersecurity-Outlook for all engineering students2024-Cybersecurity-Outlook for all engineering students
2024-Cybersecurity-Outlook for all engineering students
SandipHalder17
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
MITRE ATT&CK
Clickjacking Attack: Hijacking Users Click
Clickjacking Attack: Hijacking Users ClickClickjacking Attack: Hijacking Users Click
Clickjacking Attack: Hijacking Users Click
Eswar Publications
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
Shwetank Jayaswal
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
IRJET Journal
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
SecPod
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
SecPod
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
Ciberseguridad ingl辿s ppt trabajo PDF ingl辿s
Ciberseguridad ingl辿s ppt trabajo PDF ingl辿sCiberseguridad ingl辿s ppt trabajo PDF ingl辿s
Ciberseguridad ingl辿s ppt trabajo PDF ingl辿s
lucylloclla525
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
pmcbrideva1

Recently uploaded (20)

TAYYAB FAROOQ PHD THESIS on PHOTOACOUSTIC
TAYYAB FAROOQ PHD THESIS on PHOTOACOUSTICTAYYAB FAROOQ PHD THESIS on PHOTOACOUSTIC
TAYYAB FAROOQ PHD THESIS on PHOTOACOUSTIC
worldchinatrade
Role of Secondary Metabolites in Defence Mechanism of Plants and its Regulation
Role of Secondary Metabolites in Defence Mechanism of Plants and its RegulationRole of Secondary Metabolites in Defence Mechanism of Plants and its Regulation
Role of Secondary Metabolites in Defence Mechanism of Plants and its Regulation
ankitverma144299
Moulding techniques for polymers industrial process
Moulding techniques for polymers industrial processMoulding techniques for polymers industrial process
Moulding techniques for polymers industrial process
JinnJinnkiJaddu
Drug evaluation Organoleptic, Microscopic, Chemical, Biological
Drug evaluation Organoleptic, Microscopic, Chemical, BiologicalDrug evaluation Organoleptic, Microscopic, Chemical, Biological
Drug evaluation Organoleptic, Microscopic, Chemical, Biological
Nistarini College, Purulia (W.B) India
biochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptxbiochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptx
Amri559698
THE APAYAO CULTURAL HERITAGE CORDILLERA 101
THE APAYAO CULTURAL HERITAGE CORDILLERA 101THE APAYAO CULTURAL HERITAGE CORDILLERA 101
THE APAYAO CULTURAL HERITAGE CORDILLERA 101
jonieclairepallayoc
Successful management of intussusception in a cow under double drip anaesthesia
Successful management of intussusception  in a cow under double drip anaesthesiaSuccessful management of intussusception  in a cow under double drip anaesthesia
Successful management of intussusception in a cow under double drip anaesthesia
rajvet4163
TOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube Tutorial
TOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube TutorialTOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube Tutorial
TOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube Tutorial
Vivek Bhakta
epidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptxepidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptx
lopamudraray88
Nutrient deficiency and symptoms in plants
Nutrient deficiency and symptoms in plantsNutrient deficiency and symptoms in plants
Nutrient deficiency and symptoms in plants
laxmichoudhary77657
QUANTITATIVE GENETICS PART 2.pdf agriculture
QUANTITATIVE GENETICS PART 2.pdf agricultureQUANTITATIVE GENETICS PART 2.pdf agriculture
QUANTITATIVE GENETICS PART 2.pdf agriculture
KushiBhatia
Energ and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE PhysicsEnerg and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE Physics
Blessing Ndazie
Melaku Tafese Awyulachew's_Official letters between organizations and researc...
Melaku Tafese Awyulachew's_Official letters between organizations and researc...Melaku Tafese Awyulachew's_Official letters between organizations and researc...
Melaku Tafese Awyulachew's_Official letters between organizations and researc...
Melaku Tafese Awulachew
quantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yrquantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yr
KushiBhatia
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
tibhathakur77
Parasitology Practical Book .pdf Biomedical science
Parasitology Practical Book .pdf Biomedical scienceParasitology Practical Book .pdf Biomedical science
Parasitology Practical Book .pdf Biomedical science
saihetharan
AUTOSOMES , ALLOSOMES AND SEX RATIO IN HUMAN POPULATION
AUTOSOMES , ALLOSOMES AND SEX RATIO IN HUMAN POPULATIONAUTOSOMES , ALLOSOMES AND SEX RATIO IN HUMAN POPULATION
AUTOSOMES , ALLOSOMES AND SEX RATIO IN HUMAN POPULATION
Nistarini College, Purulia (W.B) India
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptxGrade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
MarvinAlegado
Units and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptxUnits and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptx
Dr Sarika P Patil
Climate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and EngineeringClimate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and Engineering
Zachary Labe
TAYYAB FAROOQ PHD THESIS on PHOTOACOUSTIC
TAYYAB FAROOQ PHD THESIS on PHOTOACOUSTICTAYYAB FAROOQ PHD THESIS on PHOTOACOUSTIC
TAYYAB FAROOQ PHD THESIS on PHOTOACOUSTIC
worldchinatrade
Role of Secondary Metabolites in Defence Mechanism of Plants and its Regulation
Role of Secondary Metabolites in Defence Mechanism of Plants and its RegulationRole of Secondary Metabolites in Defence Mechanism of Plants and its Regulation
Role of Secondary Metabolites in Defence Mechanism of Plants and its Regulation
ankitverma144299
Moulding techniques for polymers industrial process
Moulding techniques for polymers industrial processMoulding techniques for polymers industrial process
Moulding techniques for polymers industrial process
JinnJinnkiJaddu
biochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptxbiochemical mechanism of gall stone .pptx
biochemical mechanism of gall stone .pptx
Amri559698
THE APAYAO CULTURAL HERITAGE CORDILLERA 101
THE APAYAO CULTURAL HERITAGE CORDILLERA 101THE APAYAO CULTURAL HERITAGE CORDILLERA 101
THE APAYAO CULTURAL HERITAGE CORDILLERA 101
jonieclairepallayoc
Successful management of intussusception in a cow under double drip anaesthesia
Successful management of intussusception  in a cow under double drip anaesthesiaSuccessful management of intussusception  in a cow under double drip anaesthesia
Successful management of intussusception in a cow under double drip anaesthesia
rajvet4163
TOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube Tutorial
TOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube TutorialTOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube Tutorial
TOP 10 CBSE Top Science Projects for Classes 6 to 10 with Youtube Tutorial
Vivek Bhakta
epidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptxepidemiology (aim, component, principles).pptx
epidemiology (aim, component, principles).pptx
lopamudraray88
Nutrient deficiency and symptoms in plants
Nutrient deficiency and symptoms in plantsNutrient deficiency and symptoms in plants
Nutrient deficiency and symptoms in plants
laxmichoudhary77657
QUANTITATIVE GENETICS PART 2.pdf agriculture
QUANTITATIVE GENETICS PART 2.pdf agricultureQUANTITATIVE GENETICS PART 2.pdf agriculture
QUANTITATIVE GENETICS PART 2.pdf agriculture
KushiBhatia
Energ and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE PhysicsEnerg and Energy Forms, Work, and Power | IGCSE Physics
Energ and Energy Forms, Work, and Power | IGCSE Physics
Blessing Ndazie
Melaku Tafese Awyulachew's_Official letters between organizations and researc...
Melaku Tafese Awyulachew's_Official letters between organizations and researc...Melaku Tafese Awyulachew's_Official letters between organizations and researc...
Melaku Tafese Awyulachew's_Official letters between organizations and researc...
Melaku Tafese Awulachew
quantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yrquantitative genetics msc agriculture 1 yr
quantitative genetics msc agriculture 1 yr
KushiBhatia
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
Animal husbandry: Purpose, scope and management,dairy animals, breeds and eco...
tibhathakur77
Parasitology Practical Book .pdf Biomedical science
Parasitology Practical Book .pdf Biomedical scienceParasitology Practical Book .pdf Biomedical science
Parasitology Practical Book .pdf Biomedical science
saihetharan
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptxGrade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
Grade 08-SCIENCE (BIOLOGY)CELL DIVISION.pptx
MarvinAlegado
Units and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptxUnits and measurements includes definition and fundamental quantities.pptx
Units and measurements includes definition and fundamental quantities.pptx
Dr Sarika P Patil
Climate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and EngineeringClimate Information for Society: Attribution and Engineering
Climate Information for Society: Attribution and Engineering
Zachary Labe

Koopman Prize Presentation

  • 1. Duplicity Games for Deception Design With an Application to Insider Threat Mitigation Linan Huang and Quanyan Zhu 2022 INFORMS Annual Conference October 17, 2022
  • 7. Failure of Boundary Defense Insider Threats
  • 8. Challenge 1: Perimeter defense does not work. Challenges of Insider Threats Solution: Zero-Trust architecture
  • 9. Challenge 2: Asymmetric information Challenges of Insider Threats Solution: Cyber deception
  • 10. Challenge 3: False positive from negligent legitimate users Challenges of Insider Threats Solution: Compliance and mechanism design
  • 11. Game between a defender and an unknown user
  • 12. State Feature pattern Protocols Ports Response time Error response 1 1 1 1 2 2 1 Feature Generator 1 2 1 2 Incorporating Cyber Deception into the Game Model
  • 13. 1 1 1 1 2 2 1 Users posterior belief (1) 1 (1) (2) 1 (2)
  • 14. Users posterior belief (1) 1 (1) Users action Users utility p($, $$, $) Users type $$ $$ $ $$$
  • 15. 1 1 1 1 2 2 1 (1) 1 (1) (2) 1 (2) $$ $$ $ $$$ Feature Generator Belief Manipulator , Incentive Modulator
  • 16. There is a need for a theory for Cyber Deception Mechanism Design. Theory can go beyond the design of generator. Belief/Trust Manipulator: e.g., changing honeypot percentage Feature Generator: e.g., configuring honeypots and normal servers Incentive Modulator: e.g., using multi-step authentication How to Design the Generator?
  • 17. Duplicity Game for Mechanism Design
  • 18. Cyber deception (with focus on honeypots): Evasion risk [Spitzner 2003], Intelligence [Wagener et al. 2009, 2011], Engagement [Pawlick et al.19], Detection risk [Dowling et al. 2019], Resource consumption [Akiyama et al. 2012], False positives [Qassrawi & Zhang 2010] , Strategic design [Pawlick et al. 2021], etc. Compliance and mechanism design: Insider Threat Mitigation Guide [CISA 2020]; The Critical Role of Positive Incentives for Reducing Insider Threats [CERT/CMU 2016] Mitigating inadvertent insider threats with incentives [Liu et al. 2009]; Compliance control [Casey, et al. 2015], ZETAR [Huang and Zhu 2022]; etc. Literature
  • 19. Generator Design Problem: Defenders Problem The defender designs a utility-maximizing generator so that the user has no incentive to deviate from the recommendation.
  • 20. Dual Formulation: Users Problem The user minimizes his expected effort to satisfy the defenders security objective.
  • 21. Users action Users type K actions and M types 情 possible security policies Only (, , ) are enforceable. $$ $$ $ $$$ Always exists one optimal generator that only relies on security policies. Feasibility of Generators: Enforceable Policies
  • 22. Incentive Threshold (IT): Uncontrollable if the majority of insiders are adversarial. Deterrence Threshold (DT): Uncontrollable if there is an insufficient number of honeypots. Incentive Threshold Deterrence Threshold How does the percentage or probability of honeypots and (negligent) insiders affect defenders utility?
  • 23. If < IT && <DT, then the design of the generator is insufficient to deter an insider. Zero Trust Margin Cannot be incentivized Deterrence Capacity
  • 24. Defenders utility structure = users utility structure Defenders utility structure = -users utility structure No deception needed: Reveal full information Maximum deception needed: Reveal zero information Manageability of Incentive Modulator: Designing the Reward
  • 25. No deception needed: Reveal full information Maximum deception needed: Reveal zero information Defenders utility structure = users utility structure + Only the sign of matters. > 0 < 0 Manageability under Linearly dependent utility structure
  • 26. Principles for Joint Design of GMM Extension to Multi-Dimensional Mechanism Designs The defender can design reward independently. Separation Principle Design Information + Trust = Design Trust Equivalence Principle
  • 27. Fast Learning for Finite-Step Mitigation
  • 28. Duplicity game for designing cognitive honeypots Strategic and incentive-compatible Insider threat mitigation Enforceability, manageability, and deterrence Online and learning-based implementation Conclusions Huang, L. and Zhu, Q., 2021. Duplicity games for deception design with an application to insider threat mitigation. IEEE Transactions on Information Forensics and Security, 16, pp.4843-4856.
  • 29. Five Generations of Security Paradigms 1G-SP: Laissez-Faire Security 2G-SP: Perimeter Security 3G-SP: Reactive Security 4G-SP: Proactive Security 5G-SP: Federated Security Five Generations of Security Paradigms (SPs)
  • 30. 4G-SP: Proactive Security 5G-SP: Federated Security Emergence of AI-Powered Attacks Incorporate AI and system science to develop cognitive honeypots for 5G-SP Consolidation of Strategic, Proactive, and Autonomous Defense