97 Hits in 7.5 sec

Decoy Allocation Games on Graphs with Temporal Logic Objectives [article]

Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie
2020 arXiv   pre-print
We introduce a model of hypergames on graphs with temporal logic objectives to capture such adversarial interactions with asymmetric information.  ...  We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal.  ...  Games on graphs with temporal logic objectives have been studied extensively in the synthesis of reactive programs [7] .  ... 
arXiv:2010.01208v1 fatcat:7uqrohpdvjfm3co62zir2km5ee

A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception [article]

Abhishek N. Kulkarni, Jie Fu
2020 arXiv   pre-print
We first generalize formal graphical security models--attack graphs--to incorporate defender's countermeasures in a game-theoretic model, called an attack-defend game on graph.  ...  This game captures the dynamic interactions between the defender and the attacker and their defense/attack objectives in formal logic.  ...  Combining the game graph abstraction with the logical security specifications, we construct a model of an attack-defend game as a game on a graph with temporal logic objectives Rosner, 1989, Chatterjee  ... 
arXiv:2008.03210v1 fatcat:nqhv2ky2qzb77i54ueriokxdzy

Secure-by-synthesis network with active deception and temporal logic specifications [article]

Jie Fu, Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua
2020 arXiv   pre-print
We formulate the problem of deceptive planning with decoy systems and other defenses as a two-player games with asymmetrical information and Boolean payoffs in temporal logic.  ...  Further, we use the solution of games with co-safe (reachability) temporal logic objectives to determine whether the defender can engage the attacker, by directing the attacker to a high-fidelity honeypot  ...  relates an outcome-a sequence of states in the game graph-to properties specified in logic; and (c) the temporal logic specifications as the players' Boolean objectives.  ... 
arXiv:2002.07025v1 fatcat:yqsil3zz2fdtdbocr2l2h3e34m

Deceptive Labeling: Hypergames on Graphs for Stealthy Deception [article]

Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu
2020 arXiv   pre-print
We introduce a model called hypergame on graph to capture the asymmetrical information with one-sided payoff misperception.  ...  In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary.  ...  Zero-sum Game on a Graph: Given a game arena G and the scLTL specification ϕ of P1, a zero-sum game on a graph is a tuple, G = (G, ϕ).  ... 
arXiv:2004.05213v2 fatcat:6slx72wtwbaflnyff4mzrhrh2i

Human-Machine Collaborative Optimization via Apprenticeship Scheduling

Matthew Gombolay, Reed Jensen, Jessica Stigile, Toni Golen, Neel Shah, Sung-Hyun Son, Julie Shah
2018 The Journal of Artificial Intelligence Research  
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems  ...  We demonstrate that this approach accurately learns multifaceted heuristics on a synthetic and real world data sets.  ...  Equation 39 ensures that a missile will select the most attractive decoy according to that missile's selection logic.  ... 
doi:10.1613/jair.1.11233 fatcat:kcfhpp5xlbftfg2kiqri6jrtku

Human-Machine Collaborative Optimization via Apprenticeship Scheduling [article]

Matthew Gombolay, Reed Jensen, Jessica Stigile, Toni Golen, Neel Shah, Sung-Hyun Son, Julie Shah
2018 arXiv   pre-print
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems  ...  data sets consisting of demonstrations of experts solving a weapon-to-target assignment problem and a hospital resource allocation problem.  ...  One important component of page ranking is capturing how pages relate to one another as a graph with nodes (representing Web pages) and directed arcs (representing links between those pages) (Page et  ... 
arXiv:1805.04220v1 fatcat:hs6fnk4trnd55hhvqhwjmur3uu

A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks [article]

Zhentian Qian, Jie Fu, Quanyan Zhu
2020 arXiv   pre-print
We model the network system using a probabilistic attack graph--a graphical security model.  ...  In this paper, we study the problem of assessing the effectiveness of a proactive defense-by-detection policy with a network-based moving target defense.  ...  These models are used to verify quantitative security properties expressed via temporal logic, based on the solutions of omega-regular games [24] - [26] .  ... 
arXiv:2002.05146v3 fatcat:xgxqfgh7rzfvldyipw6d566lea

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy [article]

Jeffrey Pawlick, Edward Colbert, Quanyan Zhu
2019 arXiv   pre-print
The term deception, however, has been employed broadly and with a variety of meanings.  ...  Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy.  ...  The defender hides an object using other objects in the environment.  ... 
arXiv:1712.05441v3 fatcat:baizt74d2fg37flf57u6e6i25q

tamasomā jyotirgamaya: Seeking the Self Amidst Covids' Cytokine Cyclones

B. Mishra, R.x. Covea
2020 Journal of the Indian Institute of Science  
Pondering on pandemics and the promise of purification from the plethora of problems that it has spawned, the paper builds on a game-theoretic model of host-pathogen interaction, and... moves beyond.  ...  It highlights how quickly this 'wicked' problem has led to deceptive Nash equilibria of certain information-asymmetric games as well as their sequels of more complex intertwined games at human scale but  ...  Signaling games Signaling games are multiplayer (usually, two players) games with incomplete information: specifically, one player is informed and the other player is not.  ... 
doi:10.1007/s41745-020-00186-1 pmid:33106735 pmcid:PMC7578442 fatcat:ngbxxrcbqbcovifn4znfkd5dyy

Representation and analysis of coordinated attacks

Sviatoslav Braynov, Murtuza Jadiwala
2003 Proceedings of the 2003 ACM workshop on Formal methods in security engineering - FMSE '03  
analysis, and discuss an implementation of a coordinatedattack graph.  ...  In the paper, we define the notion of coordinated-attack graph, propose an algorithm for efficient generation of coordinated-attack graphs, demonstrate how coordinated-attack can be used for vulnerability  ...  In order to mislead the intrusion response system, all but one of these attacks are designed to be decoy.  ... 
doi:10.1145/1035429.1035434 dblp:conf/ccs/BraynovJ03 fatcat:zixctoqgw5hkxfb5huohu3lzm4

Law and logic: A review from an argumentation perspective

Henry Prakken, Giovanni Sartor
2015 Artificial Intelligence  
This article reviews legal applications of logic, with a particularly marked concern for logical models of legal argument.  ...  Then legal applications of logic are reviewed where legal rules are not just applied but are the object of reasoning and discourse.  ...  One such case is Keeble, in which a pond owner placed a duck decoy in his pond with the intention to sell the caught ducks for a living.  ... 
doi:10.1016/j.artint.2015.06.005 fatcat:r3qsbixofvgrbhkm4dwpajynu4

Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey

Minh Nguyen, Saptarshi Debroy, AnMin Fu
2022 Security and Communication Networks  
With the increased frequency and intensity of denial-of-service (DoS) attacks on critical cloud-hosted services, resource adaptation schemes adopted by the cloud service providers (CSPs) need to be intelligent  ...  However, the existing surveys that seek to explore this space either focus more on MTD for generic cyberattack mitigation or on DoS attack defense on cloud systems.  ...  of two components: (i) one that differentiates between the decoy nodes interactions with the adversary and a real node and (ii) another for adversarial game formulation in order to find the attack target  ... 
doi:10.1155/2022/2223050 fatcat:3figtl7ju5ezjbn3gwvzhjxj4e

HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles [article]

Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis
2021 arXiv   pre-print
The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical  ...  Our investigation is substantiated by examining two different versions of the game, with and without the re-configuration cost to empower the network administrator to determine optimal honeypot configurations  ...  with cross-network access, one-to-many mechanisms and high interaction capabilities replicating a programmable logic controller to gather large-scale attack data.  ... 
arXiv:2111.02364v1 fatcat:lwnkkebiafe5jasy7pw4226p2a

A Survey of Moving Target Defenses for Network Security [article]

Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati
2020 arXiv   pre-print
In trying to answer the latter question, we showcase the use of domain knowledge and game-theoretic modeling can help the defender come up with effective and efficient movement strategies.  ...  We first categorize these defenses into different sub-classes depending on what they move, when they move and how they move.  ...  Temporal and spatial diversity have been used to introduce genetic algorithm based MTD by Crouse et al. [71] .  ... 
arXiv:1905.00964v2 fatcat:tpb6i4zpjnbm3pwdoz3wsckeie

Overview - Fog Computing and Internet-of-Things (IOT)

C. S. R. Prabhu
2017 EAI Endorsed Transactions on Cloud Systems  
during execution can be represented a directed graph, Fog resources can be allocated according to the situation from time to time.  ...  In Fog, the design issues are: Where to place decoy in fog network? How to design on-demand decoy information to further reduce the amount of stolen data?  ... 
doi:10.4108/eai.20-12-2017.154378 fatcat:k3qhfv6ppje4lhmplwqbvcvkqi
« Previous Showing results 1 — 15 out of 97 results