A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks
[chapter]
2008
International Series in Operations Research and Management Science
Chapter 9 (by Kanturska et al.) considers how to improve the reliability of transportation networks through multi-path routing and link defense in a game-theoretic setting. ...
However, in lieu of formal game-theoretic models, RAMCAP™ proposes two options for risk assessment, one qualitative and one quantitative. ...
doi:10.1007/978-0-387-87767-9_1
fatcat:ynsta6cj45fgfgvxji333h5faq
A game oriented approach to minimizing cybersecurity risk
2018
International Journal of Safety and Security Engineering
It employs a game theoretic solution using a game formulation that identifies defense strategies to minimize the maximum cyber risk (MiniMax), employing the defense methods defined in the defender model ...
The risk score is calculated by using a cyber mission impact assessment (CMIA) model to compute the consequences of cyber incidents, and by applying a threat model to a system topology model and defender ...
We describe a program that allows us to play a cyber security game with an objective to minimize a mission system's cyber risk. We call our software CSG, the Cyber Security Game. ...
doi:10.2495/safe-v8-n2-212-222
fatcat:tnusgsmgfvgq7avnf5w7eo6xsy
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey
2021
Security and Communication Networks
After that, a concept named attack-defense mapping is proposed to figure out how to map the already found threats and vulnerabilities of the system to the appropriate mitigations. ...
Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development. ...
Security and Communication Networks ...
doi:10.1155/2021/1263820
fatcat:tai37rizlnhrbehomdi5oe3ofa
Smart attacks in smart grid communication networks
2012
IEEE Communications Magazine
Consequently, this article offers a novel game-theoretic framework to evaluate the cyber security when the attack and defense strategy are involved. ...
and solid theoretic approaches to network robustness assessment. ...
doi:10.1109/mcom.2012.6257523
fatcat:ru2o2l6mpbccjjwz3adf6cbys4
Development and analysis of game-theoretical models of security systems agents interaction
2020
Eastern-European Journal of Enterprise Technologies
Network Security Measurement is a large category that includes the measurement of every aspect of network security. Risk assessment [4] is one such measure. ...
One of the metrics in assessing the risk for a network system is the probability of its attack. It is necessary to predict the actions of both defenders and attackers. ...
doi:10.15587/1729-4061.2020.201418
fatcat:qvro55stizhnxcgredv6e5xll4
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
2021
Foundations and Trends in Robotics
The diversity and heterogeneity of a robot system are thereby matched with the (equal) diversity of game-theoretic security models tailored to many different scenarios of attack and defense. ...
Game theory provides a theoretical underpinning for the analysis of this tradeoff between security and performance under a prescribed set of attack models. ...
doi:10.1561/2300000061
fatcat:a53qsslhvjdkxhaswotnai4u7i
Dynamic defenses in cyber security: techniques, methods and challenges
2021
Digital Communications and Networks
being prone to attacks and difficult to take effect when responding to new types of network attacks with higher and higher degree of coordination and intelligence. ...
To bridge this gap, we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security. ...
Theoretical framework of Mimic Defense
Analysis and modeling of network attack behavior There are many methods of network attack modeling, mainly focusing on attack language, attack tree, attack network ...
doi:10.1016/j.dcan.2021.07.006
fatcat:riqd5cn5wvgofmguotmqp2kkwe
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
2016
Future Internet
We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. ...
Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. ...
Acknowledgments: This research was funded by the Australian Centre for Cyber Security.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/fi8030034
fatcat:wzd6ftmhvrcqdoavwejqufjqhy
DSGM-Based Analysis of Computer Networks Security
2013
International Journal for Information Security Research
This work presents a non-zero, Deterministic Stochastic Game-theoretic Modeling (DSGM) method for analyzing the security of computer networks. ...
Like attack-graph-based model checking, the goal of an anticipation game is to prove that a safety property holds. ...
An attack-defense game model, which quantifies the probability of threats, is formulated for the risk assessment. ...
doi:10.20533/ijisr.2042.4639.2013.0043
fatcat:zyvrxrpuzbah3isbxi22czoa5m
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
[article]
2019
arXiv
pre-print
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. ...
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks. ...
Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. ...
arXiv:1909.08092v1
fatcat:wsycpvaqgzdcvboagxlbg5x6uu
An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats
2010
2010 International Conference on Broadband, Wireless Computing, Communication and Applications
A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies. ...
The current ubiquity of information coupled with the reliance on such data by businesses, has led to a great deal of resources being deployed to ensure the security of this information. ...
Game-theoretical analysis is useful for analysing, modelling, decision and control processes for network security [7] . ...
doi:10.1109/bwcca.2010.58
dblp:conf/bwcca/VidutoMH10
fatcat:mpucopoymzfxtduoblthgxywpe
Game theory meets network security and privacy
2013
ACM Computing Surveys
In this survey, we aim to provide a better understanding of the different research approaches for applying game theory to network security. ...
This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking. ...
In ], a game-theoretic method is used to compute probabilities of an expected attacker behavior and these probabilities are used in a transition matrix model to assess security in an interconnected system ...
doi:10.1145/2480741.2480742
fatcat:55ixmohvijaelflxqrrbtnvfuu
Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management
[chapter]
2010
Performance Models and Risk Management in Communications Systems
Together with related accuracy and sensitivity analyses, this is supposed to significantly advance the risk assessment of security attacks. ...
The system is separated into a production-oriented service part and a security-related protection part and is assumed to actively take defense actions. ...
doi:10.1007/978-1-4419-0534-5_2
fatcat:s37ykxheprb2vecjz53usg6zoe
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
[article]
2021
arXiv
pre-print
A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks. ...
As a result, contemporary robotic systems are vulnerable to diverse attack patterns, and an a posteriori hardening is at least challenging, if not impossible at all. ...
Acknowledgements The authors would like to thank the support that we receive from our institutions. We thank many of our friends and colleagues for their inputs and suggestions. ...
arXiv:2103.05789v4
fatcat:p3inkof6kbh3rds6jigvmq4doe
Security Measurements of Cyber Networks
2018
Security and Communication Networks
Successful attacks and intrusions against cyber networks can result in significant impacts, ranging from personal risk to nationallevel security. ...
network security assessment and measurement. ...
We also sincerely thank the Editorial Board of Security and Communication Networks for approving this special issue and their continuous support on its final publication. ...
doi:10.1155/2018/6545314
fatcat:fugkenncbnabfmzgeu6exb2say
« Previous
Showing results 1 — 15 out of 14,252 results