totype design based upon this model utilizes accepted
taxonomies and security standards to support out-of-
the-box organization-level gameplay for simulating
cyber-attacks on various types of local or networked
assets. Our data mapping mechanisms enable domain
experts to easily extend the system with new actors,
actions, and (mitigating) equipment. We also exem-
plified how real-world data such as OS kernel events
can be linked to the model.
The development of the first educational game
prototype based on the introduced model has been
completed. Ultimately, it is planned to evaluate both
the physical release candidate as well as a simula-
tion app that will allow us to automatically compute
new attack stories and identify systemic weaknesses
in only slightly abstracted infrastructures.
Next to simulation, the APT RPG offers a solid
foundation for the development of an ontology
for targeted attacks, which can be populated by
both threat information sources as well as host and
network monitoring data. The synergies between
the data-centric and model-based game system will
significantly aid in understanding and closing the
semantic gap.
ACKNOWLEDGEMENTS
The financial support by the Austrian Federal Mini-
stry of Science, Research and Economy and the Nati-
onal Foundation for Research, Technology and Deve-
lopment is gratefully acknowledged.
REFERENCES
Barnum, S. (2012). Standardizing cyber threat intelligence
information with the Structured Threat Information
eXpression (STIX
TM
). MITRE Corporation, 11:1–22.
Caltagirone, S., Pendergast, A., and Betz, C. (2013). The di-
amond model of intrusion analysis. Technical report,
Center for Cyber Intelligence Analysis and Threat Re-
search, Hanover.
Cook, A., Smith, R., Maglaras, L., and Janicke, H. (2016).
Measuring the risk of cyber attack in industrial control
systems. BCS eWiC.
Holmgren, A. J., Jenelius, E., and Westin, J. (2007). Evalu-
ating strategies for defending electric power networks
against antagonistic attacks. IEEE Transactions on
Power Systems, 22(1):76–84.
Hutchins, E. M., Cloppert, M. J., and Amin, R. M. (2011).
Intelligence-driven computer network defense infor-
med by analysis of adversary campaigns and intrusion
kill chains. Leading Issues in Information Warfare &
Security Research, 1:80.
Kuhn, H. W. (2009). Lectures on the Theory of Games.
Princeton University Press.
Lewis, T. G. (2014). Critical infrastructure protection in ho-
meland security: Defending a networked nation. John
Wiley & Sons.
Luh, R., Schrittwieser, S., and Marschalek, S. (2016).
TAON: An ontology-based approach to mitigating tar-
geted attacks. In Proc. of the 18th Int. Conference on
Information Integration and Web-based Applications
& Services. ACM.
Luh, R., Schrittwieser, S., Marschalek, S., and Janicke, H.
(2017). Design of an anomaly-based threat detection
& explication system. In Proc. of the 3rd Int. Con-
ference on Information Systems Security & Privacy.
SCITEPRESS.
Miura-Ko, R. A., Yolken, B., Bambos, N., and Mitchell, J.
(2008). Security investment games of interdependent
organizations. In Communication, Control, and Com-
puting, 2008 46th Annual Allerton Conference on, pa-
ges 252–260. IEEE.
Nguyen, K. C., Alpcan, T., and Basar, T. (2009). Security
games with incomplete information. In Communica-
tions, 2009. ICC’09. IEEE International Conference
on, pages 1–6. IEEE.
Roger, B. M. (1991). Game theory: Analysis of conflict.
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V.,
and Wu, Q. (2010). A survey of game theory as app-
lied to network security. In System Sciences (HICSS),
2010 43rd Hawaii International Conference on, pages
1–10. IEEE.
Shannon, P., Markiel, A., Ozier, O., Baliga, N. S., Wang,
J. T., Ramage, D., Amin, N., Schwikowski, B., and
Ideker, T. (2003). Cytoscape: A software environment
for integrated models of biomolecular interaction net-
works. Genome research, 13(11):2498–2504.
Syed, Z., Padia, A., Finin, T., Mathews, M. L., and Joshi,
A. (2016). UCO: A Unified Cybersecurity Ontology.
Undercoffer, J., Pinkston, J., Joshi, A., and Finin, T. (2004).
A target-centric ontology for intrusion detection. In
18th International Joint Conference on Artificial In-
telligence, pages 9–15.
Whitman, M. E. and Mattord, H. J. (2011). Principles of
information security. Cengage Learning.
You, X. Z. and Shiyong, Z. (2003). A kind of network secu-
rity behavior model based on game theory. In Parallel
and Distributed Computing, Applications and Techno-
logies, 2003. PDCAT’2003. Proceedings of the Fourth
International Conference on, pages 950–954. IEEE.