A dynamic game solution to malware attack

Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can dynamically change the parameters of their infective hosts in response to the dynamics of the network, in order to maximize their overall damage. However, in return, the network can also dynamically change its counter-measure parameters in order to attain a robust defense against the spread of malware while minimally affecting the normal performance of the network. The infinite dimension of freedom introduced by variation over time and antagonistic and strategic optimization of malware and network against each other demand new attempts for modeling and analysis. We develop a zero-sum dynamic game model and investigate the structural properties of the saddle-point strategies. We specifically show that saddle-point strategies are simple threshold-based policies and hence, a robust dynamic defense is practicable.

[1]  Eitan Altman,et al.  Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Eitan Altman,et al.  Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[3]  Rajmohan Rajaraman,et al.  Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[4]  Eitan Altman,et al.  Optimal propagation of security patches in mobile wireless networks: extended abstract , 2010, SIGMETRICS '10.

[5]  Saswati Sarkar,et al.  Dynamic malware attack in energy-constrained mobile wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).

[6]  Eitan Altman,et al.  Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Eitan Altman,et al.  Optimal quarantining of wireless malware through power control , 2009, 2009 Information Theory and Applications Workshop.

[8]  Piet Van Mieghem,et al.  Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.

[9]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[10]  Ji Yi,et al.  A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment , 2008, 2008 International Conference on Computer Science and Software Engineering.

[11]  R. Núñez Queija,et al.  Scaling Laws for File Dissemination in P2P Networks with Random Contacts , 2008, 2008 16th Interntional Workshop on Quality of Service.

[12]  Yun Zou,et al.  Optimal Internet Worm Treatment Strategy Based on the Two‐Factor Model , 2008 .

[13]  Wei Jiang,et al.  A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[14]  Jing Zhao,et al.  A Model of Hierarchical Key Assignment Scheme with CRT , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[15]  Ahmed Helmy,et al.  Encounter-based worms: analysis and defense , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[16]  Ger Koole,et al.  The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.

[17]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[18]  Pan Hui,et al.  Pocket Switched Networks and the Consequences of Human Mobility in Conference Environments , 2005, SIGCOMM 2005.

[19]  A. Helmy,et al.  VACCINE : War of the Worms in Wired and Wireless Networks , 2005 .

[20]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[21]  Robert G. Cole Initial Studies on Worm Propagation in Manets for Future Army Combat Systems , 2004 .

[22]  Vern Paxson,et al.  A Worst-Case Worm , 2004 .

[23]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.

[24]  Donald F. Towsley,et al.  Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.

[25]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[26]  Christian Bettstetter,et al.  Mobility modeling in wireless networks: categorization, smooth movement, and border effects , 2001, MOCO.

[27]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[28]  James E. Cherry D & C , 2000 .

[29]  Daryl J. Daley,et al.  Epidemic Modelling: An Introduction , 1999 .

[30]  G. P. Szegö,et al.  Differential games and related topics , 1971 .

[31]  T. Kurtz Solutions of ordinary differential equations as limits of pure jump markov processes , 1970, Journal of Applied Probability.