网络安全问题的背景

网络安全研究的内容包括很多方面,作者形象比喻为盲人摸象,不同领域的网络安全专家对网络安全的认识是不同的。

For researchers in the field of cryptography, security is all about cryptographic algorithms and hash functions. Those who are in information security focus mainly on privacy, watermarking, and digital rights management systems. For researchers with interest in hardware, security is about tamper-resistant architectures and trusted computing.

网络安全研究的问题有很多,Securing information, controlling access to systems, developing protocols, discovering vulnerabilities, and detecting attacks are among the well-known topics of network security.

应对网络安全问题,网络安全专家当然可以做出比较好的决策,但是专家也有自身的局限性,具体来说包含三个方面:

  • The first one is scale
    面对规模和复杂度很大网络系统,凭借人的智力和精力是很难处理的。
  • A second issue is the availability of good experts
    目前非常缺少网络安全专家,因为与网络安全有关的问题非常多,很多时候缺乏经过长期训练、经验丰富的专家。
  • A third problem is the time scale
    计算机设备处理和运转速度非常快,一些网络安全问题经常需要人在分分秒秒中作出决策,人脑很难在短时间内思考出应对方法。

目前绝大部分查找网络安全问题的方式是通过分析日志文件等方式,这些方式会遗漏很多死角,而且一旦某些日志文件被管理员删除或者信息丢失,分析的结果也会有很大差别,很容易得出错误结论;在决策方面,处理网络安全问题主要还是启发式方法,这也会带来一些问题。与启发式分析相对应的是通过数学模型来分析,例如可以把安全决策问题变成一个资源优化问题,人力资源等可以量化,系统设备可以评估出安全等级,如何对不同安全等级的电脑合理分配资源?建立的优化问题完全可以用计算机来求解,而且处理规模也比单靠人力大很多。


本书主要讲述了用博弈论方法来研究网络安全问题,作者指出一个安全博弈中包含四个要素:

  • the players
    (博弈的参与者,包含 attackerdefender
  • the set of possible actions for each player
    (策略集合,对 attacker 来说指的是可以采取的破坏系统的手段和方式,对 defender指的是可以采取的保护系统的措施)
  • the outcome of each player interaction (action-reaction)
    (双方博弈的结果)
  • information structures in the game
    (博弈过程中双方对信息的掌控情况决定了博弈是完全信息博弈还是不完全信息博弈)

从风险管理的角度看待网络安全问题:

  • Today, networked systems have become an integral and indispensable part of daily business 网络系统成为生活必不可少的一部分,需求越来越大
  • Early IT and security risk management research has been mostly empirical and qualitative in nature. The situation is rapidly changing as the field is enriched by quantitative models and approaches. (早期的风险管理手段是定性分析,现在越来越多的定量方法在这一问题中得到运用)

控制安全问题的常用手段:
range from policies and rules to allocation of security resources or updating system configuration.

为什么不发展风险感知工具,使得在源头遏制风险的产生?

Stopping potential risks at their source is clearly a good strategy and one may ask why not take such actions for any perceived risk. The answer lies in the hidden and open costs of each risk control action as well as limited aggregate resources(主要是manpower and time有限).


传统传染病模型在网络安全中得到应用:

Classical epidemic models have been successfully applied to model the spread of computer malware epidemics. In these models, differential equations describe the rate of change in the number of infected hosts, which is proportional to the multiplication of currently infected and not yet infected host numbers. Such dynamic epidemic models provide a basis for optimization of patching response strategies to a worm epidemic within a quantitative cost-benefit framework.

A general optimal and robust control framework based on feedback control methods for dynamic malware removal is presented. Optimal control theory allows to explicitly specify the costs of infected hosts and the effort required to patch them. The resulting quadratic cost function is used in conjunction with the dynamic epidemic model differential equations to derive the optimal malware removal strategies.


网络安全概念

网络攻击的目的:

Attacks in the context of network security can be defined as attempts to compromise the confidentiality, integrity, and availability, or to obtain (partial) control of a computer or communication network. (攻击目的主要分为两种:(1)破坏目的,破坏系统的保密性、完整性和可用性;(2)控制目的,控制一台电脑或者网络)

网络攻击的类型:

一般来说主要分为四类:1. 盗取数据; 2. 篡改数据; 3. 拒绝服务攻击; 4. 控制设备


实施攻击的形式:

  1. Physical and hardware-based methods 对物理硬件如存储设备等发起攻击,盗取或者修改数据。
    encryption of sensitive information, confidential informationsensitive hardware, hardware-based attacks, exploit physical access to read or patch system memory, encryption schemes
  2. Software-based methods 利用软件漏洞进行攻击
    exploiting vulnerabilities in software, software flaws or bugs, malicious intent
  3. Communication-based methods 利用技术拦截用户之间的交流信息,监听以及篡改这些交流信息
    The man-in-the-middle attack, the attacker intercepts and manipulates the communication between two or more parties without their knowledge, cryptographic measures
  4. Psychological and social engineering methods 利用欺骗手段让使用者"上钩",如钓鱼网站,欺骗邮件 phishing, social engineering attacks, contain malware attachments, exploit and use fundamental human weaknesses, assessing risks on the Internet

计算机病毒、蠕虫、木马之间的区别:

A computer virus is a malicious software that hides in an existing program on the system and copies itself without permission or knowledge of the owner. Worms are similar to viruses with the distinction being that they are stand-alone programs and can spread using the network. On the other hand trojans are not self-spreading. They are defined as innocent-looking programs which secretly execute malicious functions. Other less dangerous but annoying software categories include spyware, which collects personal information without consent, and adware, which automatically displays advertisements.
(更专业的介绍见:What Is the Difference: Viruses, Worms, Trojans, and Bots?


阻止网络攻击的手段:

  1. Firewalls:inspect network traffic passing through them and filter suspicious packets, usually based on a rule-set analyzing their properties.
  2. Antivirus software: software scans storage medium and memory for signs of malware in regular intervals and removes them.
  3. Intrusion detection and prevention systems: They consist of sensors which observe security events, a console to communicate with system admins, and a decision engine to generate alerts or take responsive actions.

密码学是一把双刃剑,一方面防守者可以利用密码学对信息进行加密阻止信息被窃取;另一方面攻击者可以利用密码学对流量进行加密,导致入侵检测系统和杀毒软件失效(因为无法对加密流量进行分析): While cryptography provides a foundation for network security, it can also be a doubleedged sword. Attackers can use it to their own benefit and encrypt malware as well as attack traffic. Since current firewalls and IDS systems cannot detect malware in encrypted traffic, use of cryptographic methods by attackers may render many existing defense mechanisms useless.

网络安全博弈

博弈论与最优化理论在解决网络安全问题中的区别:

A game theoretic framework for defensive decision making has a distinct advantage over optimization as it explicitly captures the effects of the attacker behavior in the model, in addition to the ones of the defensive actions. Plain optimization formulations, on the other hand, focus only on optimization of defensive resources without taking attackers into account. (总的来说,优化方法往往只关注防守方,比如说最小化防守方的损失,而博弈论方法在解决网络安全问题时不仅仅考虑防守方的策略,同时兼顾攻击方的策略,这是博弈论方法比优化方法优秀的地方)
zero-sum game, nonzero-sum game

网络安全博弈下的纳什均衡:
At NE, a player cannot improve his outcome by altering his decision unilaterally while others play the NE strategy. In a security game, the NE solution provides insights to expected attacker behavior by mapping attacker preferences to an attack strategy under a given set of circumstances. Likewise, the NE strategy of the defender can be used as a guideline on how to allocate limited defense resources when facing an attacker. (达到纳什均衡解时,一方不能单方面的改变自己的策略来获得更多收益)

在博弈论问题中,都会假设参与者是理性的:Rationality of players is an important underlying assumption of the class of security games.

入侵检测系统(IDS)一般包括三个环节:信息源,分析,响应。这三个环节都可能用到博弈论来分析,但是一般还是在响应中用到博弈论居多。

网络攻击者主要是 selfish and malicious nodes, 其中自私节点的目的是自己的收益最大化:While the selfish nodes aim to transmit to a common receiver and maximize their throughput; 而恶意节点的目的是破坏系统的正常运行:the malicious nodes try to disrupt communication by simultaneous transmissions and jamming.

随机博弈

随机博弈和静态博弈的主要区别:
随机博弈每一阶段的收益由参与者所处的状态和决策共同决定,而且决策完成后根据Markov转移概率进入新的状态;静态博弈每次所作决策的收益与参与者所处状态无关,可以简单看作重复博弈。

在随机博弈中,大部分模型都是构建成零和博弈来分析问题。在非零和的随机博弈模型中,因为可能存在多个纳什均衡解,导致了博弈均衡解可能不收敛,这是这类问题的最大挑战。


Markov Game Model:

  • 攻击者和防御者表示为:\(P^A\) 和 \(P^D\)
  • 攻击者和防御者的策略集合为:\(A^A: =\{a_1,\dots,a_{N_A}\}\), \(A^D: =\{d_1,\dots,d_{N_D}\}\);参与者的状态空间为:\(S=\{s_1,s_2,\dots,s_{N_s}\}\).
  • 状态转移参数由映射 \(M\) 决定:\(M: S\times A^A\times A^D\rightarrow S\)

用 \(p^S: =[p_1,\dots,p_N]\)表示状态空间 \(S\) 的分布,其中 \(0\leq p^S\leq 1\) 且 \(\sum_ip_i^S=1\),那么映射 \(M\) 可以表示一个 \(N_S\times N_S\) 维的Markov概率转移矩阵,并且有:\(p^S(t+1)=Mp^S(t)\)


有关零和随机博弈的解:
(1)零和随机博弈的最优解就是平稳状态解,一般存在且唯一
(2)可以用动态规划方法来求这个最优解


因为在随机博弈中,攻击者的行为往往很难预知,尤其对于随机攻击而言,这个时候会用到恶意软件过滤器(Malware filters):

Malware filters are network security measures that are implemented on or next to the network elements, instead of hosts, in order to enforce certain network-wide security policies.

因为能量、延迟等原因,恶意软件过滤器不能时刻都处于激活状态:

Malware filters cannot be fully deployed or activated on all links all the time due to restrictions on capacity, delay, and energy.


在最坏的情况下,攻击者可以利用一些手段如分布式拒绝服务攻击获得系统的拓扑结构以及路由状态,因此在这种情况下,攻击者被看作是理性和智慧的,他能够根据防御情况来改变攻击策略:

In the worst case scenario, the attackers attempting to gain unauthorized access to a target system residing in the network or compromise its accessibility through distributed denial of service (DDoS) attacks are expected to have complete knowledge of the internal configuration of the network such as routing states or detector locations. Thus, the attackers should be seen as rational and intelligent players who respond to defensive actions by choosing different targets or routes to inject the malware.

可以用 Network Security Simulator (NeSSi) 来做带有过滤的网络安全模拟。

网络安全风险管理

风险管理框架下的网络安全分析步骤(写作):

Security risk assessment and response are posed as dynamic resource allocation problems. First, a quantitative risk management framework based on probabilistic evolution
of risk and Markov decision processes is presented. Second, a noncooperative game model is analyzed for long-term security investments of interdependent organizations. In addition, incentive mechanisms are investigated to achieve organization-wide objectives. Finally, a cooperative game is studied to develop a better understanding of coalition formation and operation between divisions of large organizations.

网络安全领域的风险管理:

Risk management in this specific area is, consequently, a young and vibrant field with substantial research challenges and opportunities.

四类风险:恶意和自然,系统和个体

基本的风险管理过程可以分为以下三步:

  1. risk assessment involving identification of vulnerabilities and assessment of their potential effects;(风险建模和评估过程)
  2. risk analysis and decision-making, which includes creating a risk-management plan as well as deciding on what are the feasible counter-measures given organizational priorities and constraints; (风险分析和决策过程)
  3. execution of measures that may involve dynamic allocation of existing resources, organizational changes, and future investments.(风险响应过程)

建立风险分析模型的一个方式是:A Probabilistic Risk Framework(概率风险框架)。利用风险扩散机制,两个相互关联的组织可以构建成二部图,风险在二部图上来回扩散,也即\(Y_{n+1}=M\times Y_{n}\),其中\(Y\)表示风险,可以证明迭代矩阵\(M\)可以表示Markov转移概率,行和为1,风险最终将收敛到一个稳定水平。

《Network Security A Decision and Game Theoretic Approach》阅读笔记的更多相关文章

  1. 阅读《RobHess的SIFT源码分析:综述》笔记

    今天总算是机缘巧合的找到了照样一篇纲要性质的文章. 如是能早一些找到就好了.不过“在你认为为时已晚的时候,其实还为时未晚”倒是也能聊以自慰,不过不能经常这样迷惑自己,毕竟我需要开始跑了! 就照着这个大 ...

  2. RobHess的SIFT源码分析:imgfeatures.h和imgfeatures.c文件

    SIFT源码分析系列文章的索引在这里:RobHess的SIFT源码分析:综述 imgfeatures.h中有SIFT特征点结构struct feature的定义,除此之外还有一些特征点的导入导出以及特 ...

  3. RobHess的SIFT源码分析:综述

    最初的目的是想做全景图像拼接,一开始找了OpenCV中自带的全景拼接的样例,用的是Stitcher类,可以很方便的实现全景拼接,而且效果很好,但是不利于做深入研究. 使用OpenCV中自带的Stitc ...

  4. 阅读《RobHess的SIFT源码分析:综述》笔记2

    今天开始磕代码部分. part1: 1. sift特征提取. img1_Feat = cvCloneImage(img1);//复制图1,深拷贝,用来画特征点 img2_Feat = cvCloneI ...

  5. element-ui button组件 radio组件源码分析整理笔记(一)

    Button组件 button.vue <template> <button class="el-button" @click="handleClick ...

  6. element-ui 组件源码分析整理笔记目录

    element-ui button组件 radio组件源码分析整理笔记(一) element-ui switch组件源码分析整理笔记(二) element-ui inputNumber.Card .B ...

  7. element-ui Carousel 走马灯源码分析整理笔记(十一)

    Carousel 走马灯源码分析整理笔记,这篇写的不详细,后面有空补充 main.vue <template> <!--走马灯的最外层包裹div--> <div clas ...

  8. STL源码分析读书笔记--第二章--空间配置器(allocator)

    声明:侯捷先生的STL源码剖析第二章个人感觉讲得蛮乱的,而且跟第三章有关,建议看完第三章再看第二章,网上有人上传了一篇读书笔记,觉得这个读书笔记的内容和编排还不错,我的这篇总结基本就延续了该读书笔记的 ...

  9. element-ui MessageBox组件源码分析整理笔记(十二)

    MessageBox组件源码,有添加部分注释 main.vue <template> <transition name="msgbox-fade"> < ...

  10. element-ui switch组件源码分析整理笔记(二)

    源码如下: <template> <div class="el-switch" :class="{ 'is-disabled': switchDisab ...

随机推荐

  1. c++ 网络库

    1.libevent 2.boost::asio 3.ace boost::asio以前看过,不过忘记了 学习,学习

  2. Windows下运行Linux命令

    安装Gow软件,Gow-0.7.0.exe,这样就可以在Windows命令行运行Linux命令,比如通过scp把Windows下的文件拷贝到Linux下. 直接运行安装,不会生成任何客户端,直接使用W ...

  3. Java+opencv实现人脸检测

    版本 Java1.8 opencv3.4 代码: import java.awt.Graphics; import java.awt.image.BufferedImage; import javax ...

  4. 重建二叉树(JAVA)

    重建二叉树 题目描述 输入某二叉树的前序遍历和中序遍历的结果,请重建出该二叉树.假设输入的前序遍历和中序遍历的结果中都不含重复的数字. 例如输入前序遍历序列{1,2,4,7,3,5,6,8}和中序遍历 ...

  5. Linux Capability探索实验

    Linux内核从2.1版本开始,就开始支持Capabilities的安全机制.Capabilities安全机制提出的目的在于实现系统特权操作的更加细粒度的访问控制,使用户能够根据实际的安全需求来控制r ...

  6. ADS1.2和JlinkV8 erro starting external process,Process error code 87(0x57)参数错误

    ADS1.2和JlinkV8  erro starting external process,Process error code 87(0x57)参数错误 网上的大致说法是说这个跟W7有关 说是将I ...

  7. instant client 的配置

    instant client 的配置 oracle server developer自带了客户端 解压目录:D:\Toolkit\instantclient_11_2 设置环境变量 Ø  在Path变 ...

  8. Git和Svn对比

    From: https://wenku.baidu.com/view/1f090e2e7275a417866fb84ae45c3b3567ecdd12.html Git和Svn对比   共享文档   ...

  9. <Numerical Analysis>(by Timothy Sauer) Notes

    2ed,  by Timothy Sauer DEFINITION 1.3A solution is correct within p decimal places if the error is l ...

  10. Git-撤销(回退)已经add,commit或push的提交

    本文只阐述如何解决问题,不会对git的各种概念多做介绍,如果有兴趣可以点击下面的链接,进行详细的学习:Pro Git本文适用的环境 现在先假设几个环境,本文将会给出相应的解决方法:1. 本地代码(或文 ...