Filters








14,960 Hits in 12.0 sec

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
2021 arXiv   pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources.  ...  It closes with an outline of some research directions to tackle major gaps in current defensive deception research.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.  ... 
arXiv:2101.10121v2 fatcat:ko2mzzvyerehnfxbwgeuz72ilu

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks.  ...  Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

Moving Target Defense for Web Applications using Bayesian Stackelberg Games [article]

Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
2016 arXiv   pre-print
Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between multiple  ...  To address this issue, we propose modeling of a real-world MTD web application as a repeated Bayesian game.  ...  ACKNOWLEDGMENTS This work was partially supported by the grants from National Science Foundation (NSF-SFS-1129561) and the Center for Cybersecurity and Digital Forensics at Arizona State University.  ... 
arXiv:1602.07024v3 fatcat:labcdvt3undznnmvqfjvuir4p4

Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense [article]

Sailik Sengupta, Subbarao Kambhampati
2020 arXiv   pre-print
We show that our learning approach converges to an SSE of a BSMG and then highlight that the learned movement policy (1) improves the state-of-the-art in MTD for web-application security and (2) converges  ...  To take away an attacker's advantage of reconnaissance, researchers have proposed proactive defense methods such as Moving Target Defense (MTD).  ...  , NSF grants 1936997 (C-ACCEL), 1844325, and a NASA grant NNX17AD06G.  ... 
arXiv:2007.10457v1 fatcat:ddz3g2cezza57lhf3tdhtdkwxa

A Survey of Game Theory as Applied to Network Security

Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu
2010 2010 43rd Hawaii International Conference on System Sciences  
Researchers have been exploring the applicability of game theoretic approaches to address the network security issues and some of these approaches look promising.  ...  This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions.  ...  The question then becomes: How do we construct such a game theoretic approach in cyberspace? In general, a game-theoretic approach works with at least two players.  ... 
doi:10.1109/hicss.2010.35 dblp:conf/hicss/RoyESDSW10 fatcat:hom3hguma5a4nji65wdcoiseoq

A Markov game theoretic data fusion approach for cyber situational awareness

Dan Shen, Genshe Chen, Jose B. Cruz, Jr., Leonard Haynes, Martin Kruger, Erik Blasch, Belur V. Dasarathy
2007 Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2007  
This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense.  ...  Game theory captures the nature of cyber conflicts: determination of the attacking-force strategies is tightly coupled to determination of the defense-force strategies and vice versa.  ...  SIMULATION AND VISUALIZATION TOOL To evaluate our game theoretic approach for cyber attack prediction and mitigation, we have constructed a Cyber Game Simulation Platform (CGSP) based on an open-source  ... 
doi:10.1117/12.720090 fatcat:hr3peq5hozgg7gg3nphllt3vn4

On Moving Target Techniques for Network Defense Security

Shouq Mohsen Alnemari, Sabah M Alzahrani
2021 International journal of recent technology and engineering  
The purpose of the study is to give general directions of research regarding critical features of defense techniques to scholars seeking to improve proactive and adaptive moving target defense mechanisms  ...  The moving target defense idea appeared as a preemptive protect mechanism aimed at preventing attacks.  ...  In MTDeep, the entered photo is categorized by choosing a grid from a group of grids based on a strategy created via the theoretical reasoning of the game randomly.  ... 
doi:10.35940/ijrte.e5111.019521 fatcat:stts5i22abfvzpcf3cawvjvpmy

Moving target defense: state of the art and characteristics

Gui-lin Cai, Bao-sheng Wang, Wei Hu, Tian-zuo Wang
2016 Frontiers of Information Technology & Electronic Engineering  
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security.  ...  Finally, we provide a number of observations for the future direction in this field, which can be helpful for subsequent researchers.  ...  Manadhata (2013) introduced a game theoretic attack surface shifting and reduction approach to explore the optimal MTD strategy, in which a complete and perfect information stochastic game model was used  ... 
doi:10.1631/fitee.1601321 fatcat:a237eemsfjhsxjrar3fmwbmceu

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

2020 KSII Transactions on Internet and Information Systems  
Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy.  ...  In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed.  ...  In particular, we thank Prof. Yuling Liu from Institute of Information Engineering Chinese Academy of Sciences for his beneficial help in improving the paper.  ... 
doi:10.3837/tiis.2020.10.013 fatcat:dshxjovqrvadzprrzgh6bvb2vq

Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks [article]

Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, Subbarao Kambhampati
2019 arXiv   pre-print
Thus, there has been a recent interest in developing Moving Target Defense (MTD) mechanisms that helps one optimize the joint objective of maximizing security while ensuring that the impact on performance  ...  In this work, we leverage knowledge in attack graphs of a cloud network in formulating a zero-sum Markov Game and use the Common Vulnerability Scoring System (CVSS) to come up with meaningful utility values  ...  Acknowledgment We thank the reviewers for their insightful comments and constructive feedback.  ... 
arXiv:1812.09660v2 fatcat:5cstdinaxjcttmvh4rcpphar6i

Game Theory for Network Security

Xiannuan Liang, Yang Xiao
2013 IEEE Communications Surveys and Tutorials  
Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks.  ...  In addition to the introduction to the state of the art, we discuss the limitations of those game theoretic approaches and propose future research directions.  ...  The applications for analysis of network attack-defense consist of two sub-classes: a) those for general analysis of attack-defense, and b) those for specialized analysis of attack-defense, explained in  ... 
doi:10.1109/surv.2012.062612.00056 fatcat:wn7l3y2sgvaqvaneotfzhaxzoy

A cost-effective shuffling method against DDoS attacks using Moving Target Defense [article]

Yu-Yang Zhou, Guang Cheng
2019 arXiv   pre-print
Moving Target Defense(MTD) has emerged as a good solution to alter the asymmetric situation of attacks and defenses, shuffling-based moving target defense has been regarded as one of the most effective  ...  the effectiveness and cost of shuffling in a given shuffling scenario.  ...  In general, the results indicate that our approach requires 3.82-3.97s in each shuffle, including strategy generation and shuffling procedure, which is acceptable for users to wait for the restart of services  ... 
arXiv:1903.10102v2 fatcat:bga3fmmptzevhgc4ih3b7bnu4u

Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars

Maxime Ayrault, Ulrich Kühne, Étienne Borde
2022 Information  
However, resource constraints and losses in quality of service need to be taken into account for such Moving Target Defenses (MTDs).  ...  In this article, we present a game-theoretic model that can be used to compute an optimal MTD defense for a critical embedded system that is facing several attackers with different objectives.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable.  ... 
doi:10.3390/info13050242 fatcat:4zbpjrdrb5hzthlbjgpqnxs7nm

Strategy Selection for Moving Target Defense in Incomplete Information Game

Huan Zhang, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, Bin Wu
2019 Computers Materials & Continua  
Although the moving target defense (MTD) has been proposed to increase the attack difficulty for the attackers, there is no solo approach can cope with different attacks; in addition, it is impossible  ...  As a core component of the network, web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities  ...  Acknowledgement: Thanks for the valuable review comments of every expert and editor.  ... 
doi:10.32604/cmc.2020.06553 fatcat:kwnsktbnqnewzedhvdlfw7bmve

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, Jung Taek Seo
2022 Sensors  
In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics.  ...  Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies.  ...  for cybersecurity × [30] 2020 A Survey article on Moving Target Defenses in order to implement Network Security × A Review of Defensive Deception techniques [25] 2021 Employed with the help of Game Theory  ... 
doi:10.3390/s22062194 pmid:35336373 pmcid:PMC8952217 fatcat:hgtvnjuzxfgudpa76fke433qhy
« Previous Showing results 1 — 15 out of 14,960 results