论文标题
游戏理论恶意软件检测
Game-Theoretic Malware Detection
论文作者
论文摘要
恶意软件攻击是昂贵的。为了减轻此类攻击,组织部署了恶意软件检测工具,以帮助他们检测并最终解决这些威胁。虽然仅运行最佳的可用工具并不能提供足够的潜在攻击覆盖范围,但在财务成本和计算资源方面,运行所有可用工具的昂贵。因此,组织通常会运行一组工具,这些工具在预算有限的情况下最大化其承保范围。但是,组织应该如何选择该集合?攻击者是战略性的,将改变其行为,以优先利用确定性的工具选择所留下的空白。为避免留下如此易于探索的空白,后卫必须选择一个随机集。 在本文中,我们提出了一种方法,可以通过将攻击者与安全分析师之间的关系建模为领导者陪伴Stackelberg安全游戏,来计算大小可用安全分析工具的最佳随机化。我们通过将Virustotal数据集中的信息与来自国家漏洞数据库的更详细的报告相结合来估计模型的参数。在经验比较中,我们的方法在广泛的假设下优于一组天然基线。
Malware attacks are costly. To mitigate against such attacks, organizations deploy malware detection tools that help them detect and eventually resolve those threats. While running only the best available tool does not provide enough coverage of the potential attacks, running all available tools is prohibitively expensive in terms of financial cost and computing resources. Therefore, an organization typically runs a set of tools that maximizes their coverage given a limited budget. However, how should an organization choose that set? Attackers are strategic, and will change their behavior to preferentially exploit the gaps left by a deterministic choice of tools. To avoid leaving such easily-exploited gaps, the defender must choose a random set. In this paper, we present an approach to compute an optimal randomization over size-bounded sets of available security analysis tools by modeling the relationship between attackers and security analysts as a leader-follower Stackelberg security game. We estimate the parameters of our model by combining the information from the VirusTotal dataset with the more detailed reports from the National Vulnerability Database. In an empirical comparison, our approach outperforms a set of natural baselines under a wide range of assumptions.