FlipThem: Modeling targeted attacks with FlipIt for multiple resources

50Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent high-profile targeted attacks showed that even the most secure and secluded networks can be compromised by motivated and resourceful attackers, and that such a system compromise may not be immediately detected by the system owner. Researchers at RSA proposed the FlipIt game to study the impact of such stealthy takeovers. In the basic FlipIt game, an attacker and a defender fight over a single resource; in practice, however, systems typically consist of multiple resources that can be targeted. In this paper, we present FlipThem, a generalization of FlipIt to multiple resources. To formulate the players’ goals and study their best strategies, we introduce two control models: in the AND model, the attacker has to compromise all resources in order to take over the entire system, while in the OR model, she has to compromise only one. Our analytical and numerical results provide practical recommendations for defenders.

Cite

CITATION STYLE

APA

Laszka, A., Horvath, G., Felegyhazi, M., & Buttyán, L. (2014). FlipThem: Modeling targeted attacks with FlipIt for multiple resources. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8840, 175–194. https://doi.org/10.1007/978-3-319-12601-2_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free