Filters








14,252 Hits in 7.3 sec

Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks [chapter]

Vicki M. Bier, Louis A. Cox, M. Naceur Azaiez
2008 International Series in Operations Research and Management Science  
Chapter 9 (by Kanturska et al.) considers how to improve the reliability of transportation networks through multi-path routing and link defense in a game-theoretic setting.  ...  However, in lieu of formal game-theoretic models, RAMCAP™ proposes two options for risk assessment, one qualitative and one quantitative.  ... 
doi:10.1007/978-0-387-87767-9_1 fatcat:ynsta6cj45fgfgvxji333h5faq

A game oriented approach to minimizing cybersecurity risk

Scott Musman, Andrew J. Turner
2018 International Journal of Safety and Security Engineering  
It employs a game theoretic solution using a game formulation that identifies defense strategies to minimize the maximum cyber risk (MiniMax), employing the defense methods defined in the defender model  ...  The risk score is calculated by using a cyber mission impact assessment (CMIA) model to compute the consequences of cyber incidents, and by applying a threat model to a system topology model and defender  ...  We describe a program that allows us to play a cyber security game with an objective to minimize a mission system's cyber risk. We call our software CSG, the Cyber Security Game.  ... 
doi:10.2495/safe-v8-n2-212-222 fatcat:tnusgsmgfvgq7avnf5w7eo6xsy

Threat Analysis and Risk Assessment for Connected Vehicles: A Survey

Feng Luo, Yifan Jiang, Zhaojing Zhang, Yi Ren, Shuo Hou, George Drosatos
2021 Security and Communication Networks  
After that, a concept named attack-defense mapping is proposed to figure out how to map the already found threats and vulnerabilities of the system to the appropriate mitigations.  ...  Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development.  ...  Security and Communication Networks  ... 
doi:10.1155/2021/1263820 fatcat:tai37rizlnhrbehomdi5oe3ofa

Smart attacks in smart grid communication networks

Pin-Yu Chen, Shin-Ming Cheng, Kwang-Cheng Chen
2012 IEEE Communications Magazine  
Consequently, this article offers a novel game-theoretic framework to evaluate the cyber security when the attack and defense strategy are involved.  ...  and solid theoretic approaches to network robustness assessment.  ... 
doi:10.1109/mcom.2012.6257523 fatcat:ru2o2l6mpbccjjwz3adf6cbys4

Development and analysis of game-theoretical models of security systems agents interaction

Serhii Yevseiev, Oleksandr Milov, Stanislav Milevskyi, Oleksandr Voitko, Maksym Kasianenko, Yevgen Melenti, Serhii Pohasii, Hrygorii Stepanov, Oleksandr Turinskyi, Serhii Faraon
2020 Eastern-European Journal of Enterprise Technologies  
Network Security Measurement is a large category that includes the measurement of every aspect of network security. Risk assessment [4] is one such measure.  ...  One of the metrics in assessing the risk for a network system is the probability of its attack. It is necessary to predict the actions of both defenders and attackers.  ... 
doi:10.15587/1729-4061.2020.201418 fatcat:qvro55stizhnxcgredv6e5xll4

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Víctor Mayoral Vilches
2021 Foundations and Trends in Robotics  
The diversity and heterogeneity of a robot system are thereby matched with the (equal) diversity of game-theoretic security models tailored to many different scenarios of attack and defense.  ...  Game theory provides a theoretical underpinning for the analysis of this tradeoff between security and performance under a prescribed set of attack models.  ... 
doi:10.1561/2300000061 fatcat:a53qsslhvjdkxhaswotnai4u7i

Dynamic defenses in cyber security: techniques, methods and challenges

Yu Zheng, Zheng Li, Xiaolong Xu, Qingzhan Zhao
2021 Digital Communications and Networks  
being prone to attacks and difficult to take effect when responding to new types of network attacks with higher and higher degree of coordination and intelligence.  ...  To bridge this gap, we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.  ...  Theoretical framework of Mimic Defense Analysis and modeling of network attack behavior There are many methods of network attack modeling, mainly focusing on attack language, attack tree, attack network  ... 
doi:10.1016/j.dcan.2021.07.006 fatcat:riqd5cn5wvgofmguotmqp2kkwe

A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

Kathryn Merrick, Medria Hardhienata, Kamran Shafi, Jiankun Hu
2016 Future Internet  
We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios.  ...  Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory.  ...  Acknowledgments: This research was funded by the Australian Centre for Cyber Security. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi8030034 fatcat:wzd6ftmhvrcqdoavwejqufjqhy

DSGM-Based Analysis of Computer Networks Security

Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel
2013 International Journal for Information Security Research  
This work presents a non-zero, Deterministic Stochastic Game-theoretic Modeling (DSGM) method for analyzing the security of computer networks.  ...  Like attack-graph-based model checking, the goal of an anticipation game is to prove that a safety property holds.  ...  An attack-defense game model, which quantifies the probability of threats, is formulated for the risk assessment.  ... 
doi:10.20533/ijisr.2042.4639.2013.0043 fatcat:zyvrxrpuzbah3isbxi22czoa5m

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats

Valentina Viduto, Carsten Maple, Wei Huang
2010 2010 International Conference on Broadband, Wireless Computing, Communication and Applications  
A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.  ...  The current ubiquity of information coupled with the reliance on such data by businesses, has led to a great deal of resources being deployed to ensure the security of this information.  ...  Game-theoretical analysis is useful for analysing, modelling, decision and control processes for network security [7] .  ... 
doi:10.1109/bwcca.2010.58 dblp:conf/bwcca/VidutoMH10 fatcat:mpucopoymzfxtduoblthgxywpe

Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
2013 ACM Computing Surveys  
In this survey, we aim to provide a better understanding of the different research approaches for applying game theory to network security.  ...  This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.  ...  In ], a game-theoretic method is used to compute probabilities of an expected attacker behavior and these probabilities are used in a transition matrix model to assess security in an interconnected system  ... 
doi:10.1145/2480741.2480742 fatcat:55ixmohvijaelflxqrrbtnvfuu

Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management [chapter]

Patrick Maillé, Peter Reichl, Bruno Tuffin
2010 Performance Models and Risk Management in Communications Systems  
Together with related accuracy and sensitivity analyses, this is supposed to significantly advance the risk assessment of security attacks.  ...  The system is separated into a production-oriented service part and a security-related protection part and is assumed to actively take defense actions.  ... 
doi:10.1007/978-1-4419-0534-5_2 fatcat:s37ykxheprb2vecjz53usg6zoe

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice [article]

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches
2021 arXiv   pre-print
A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks.  ...  As a result, contemporary robotic systems are vulnerable to diverse attack patterns, and an a posteriori hardening is at least challenging, if not impossible at all.  ...  Acknowledgements The authors would like to thank the support that we receive from our institutions. We thank many of our friends and colleagues for their inputs and suggestions.  ... 
arXiv:2103.05789v4 fatcat:p3inkof6kbh3rds6jigvmq4doe

Security Measurements of Cyber Networks

Zheng Yan, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang
2018 Security and Communication Networks  
Successful attacks and intrusions against cyber networks can result in significant impacts, ranging from personal risk to nationallevel security.  ...  network security assessment and measurement.  ...  We also sincerely thank the Editorial Board of Security and Communication Networks for approving this special issue and their continuous support on its final publication.  ... 
doi:10.1155/2018/6545314 fatcat:fugkenncbnabfmzgeu6exb2say
« Previous Showing results 1 — 15 out of 14,252 results