kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
Department of Control Science and Engineering and Shanghai Research Institute for Intelligent Autonomous Systems, Tongji University, Shanghai, P. R. China.
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0003-0698-7910
Department of Control Science and Engineering and Shanghai Research Institute for Intelligent Autonomous Systems, Tongji University, Shanghai, P. R. China.
2024 (English)In: Unmanned Systems, ISSN 2301-3850, E-ISSN 2301-3869, Vol. 12, no 2, p. 341-358Article in journal (Refereed) Published
Abstract [en]

In this paper, we propose a game theory framework to solve advanced persistent threat problems, especially considering two types of insider threats: malicious and inadvertent. Within this framework, we establish a unified three-player game model and derive Nash equilibria in response to different types of insider threats. By analyzing these Nash equilibria, we provide quantitative solutions to advanced persistent threat problems pertaining to insider threats. Furthermore, we have conducted a comparative assessment of the optimal defense strategy and corresponding defender’s costs between two types of insider threats. Interestingly, our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones, despite the latter imposing a higher burden on the defender. Our theoretical results are substantiated by numerical results, which additionally include a detailed exploration of the conditions under which different insiders adopt risky strategies. These conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.

Place, publisher, year, edition, pages
World Scientific Pub Co Pte Ltd , 2024. Vol. 12, no 2, p. 341-358
Keywords [en]
advanced persistent threat, insider threats, Nash equilibrium, Security game
National Category
Economics and Business
Identifiers
URN: urn:nbn:se:kth:diva-344584DOI: 10.1142/S2301385024410152ISI: 001153998600005Scopus ID: 2-s2.0-85187525221OAI: oai:DiVA.org:kth-344584DiVA, id: diva2:1845972
Note

QC 20240321

Available from: 2024-03-20 Created: 2024-03-20 Last updated: 2024-03-21Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Chen, Guanpu

Search in DiVA

By author/editor
Chen, Guanpu
By organisation
Decision and Control Systems (Automatic Control)
In the same journal
Unmanned Systems
Economics and Business

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 54 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf