A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Decoy Allocation Games on Graphs with Temporal Logic Objectives
[article]
2020
arXiv
pre-print
We introduce a model of hypergames on graphs with temporal logic objectives to capture such adversarial interactions with asymmetric information. ...
We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal. ...
Games on graphs with temporal logic objectives have been studied extensively in the synthesis of reactive programs [7] . ...
arXiv:2010.01208v1
fatcat:7uqrohpdvjfm3co62zir2km5ee
A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception
[article]
2020
arXiv
pre-print
We first generalize formal graphical security models--attack graphs--to incorporate defender's countermeasures in a game-theoretic model, called an attack-defend game on graph. ...
This game captures the dynamic interactions between the defender and the attacker and their defense/attack objectives in formal logic. ...
Combining the game graph abstraction with the logical security specifications, we construct a model of an attack-defend game as a game on a graph with temporal logic objectives Rosner, 1989, Chatterjee ...
arXiv:2008.03210v1
fatcat:nqhv2ky2qzb77i54ueriokxdzy
Secure-by-synthesis network with active deception and temporal logic specifications
[article]
2020
arXiv
pre-print
We formulate the problem of deceptive planning with decoy systems and other defenses as a two-player games with asymmetrical information and Boolean payoffs in temporal logic. ...
Further, we use the solution of games with co-safe (reachability) temporal logic objectives to determine whether the defender can engage the attacker, by directing the attacker to a high-fidelity honeypot ...
relates an outcome-a sequence of states in the game graph-to properties specified in logic; and (c) the temporal logic specifications as the players' Boolean objectives. ...
arXiv:2002.07025v1
fatcat:yqsil3zz2fdtdbocr2l2h3e34m
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception
[article]
2020
arXiv
pre-print
We introduce a model called hypergame on graph to capture the asymmetrical information with one-sided payoff misperception. ...
In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. ...
Zero-sum Game on a Graph: Given a game arena G and the scLTL specification ϕ of P1, a zero-sum game on a graph is a tuple, G = (G, ϕ). ...
arXiv:2004.05213v2
fatcat:6slx72wtwbaflnyff4mzrhrh2i
Human-Machine Collaborative Optimization via Apprenticeship Scheduling
2018
The Journal of Artificial Intelligence Research
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems ...
We demonstrate that this approach accurately learns multifaceted heuristics on a synthetic and real world data sets. ...
Equation 39 ensures that a missile will select the most attractive decoy according to that missile's selection logic. ...
doi:10.1613/jair.1.11233
fatcat:kcfhpp5xlbftfg2kiqri6jrtku
Human-Machine Collaborative Optimization via Apprenticeship Scheduling
[article]
2018
arXiv
pre-print
Coordinating agents to complete a set of tasks with intercoupled temporal and resource constraints is computationally challenging, yet human domain experts can solve these difficult scheduling problems ...
data sets consisting of demonstrations of experts solving a weapon-to-target assignment problem and a hospital resource allocation problem. ...
One important component of page ranking is capturing how pages relate to one another as a graph with nodes (representing Web pages) and directed arcs (representing links between those pages) (Page et ...
arXiv:1805.04220v1
fatcat:hs6fnk4trnd55hhvqhwjmur3uu
A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks
[article]
2020
arXiv
pre-print
We model the network system using a probabilistic attack graph--a graphical security model. ...
In this paper, we study the problem of assessing the effectiveness of a proactive defense-by-detection policy with a network-based moving target defense. ...
These models are used to verify quantitative security properties expressed via temporal logic, based on the solutions of omega-regular games [24] - [26] . ...
arXiv:2002.05146v3
fatcat:xgxqfgh7rzfvldyipw6d566lea
A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
[article]
2019
arXiv
pre-print
The term deception, however, has been employed broadly and with a variety of meanings. ...
Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy. ...
The defender hides an object using other objects in the environment. ...
arXiv:1712.05441v3
fatcat:baizt74d2fg37flf57u6e6i25q
tamasomā jyotirgamaya: Seeking the Self Amidst Covids' Cytokine Cyclones
2020
Journal of the Indian Institute of Science
Pondering on pandemics and the promise of purification from the plethora of problems that it has spawned, the paper builds on a game-theoretic model of host-pathogen interaction, and... moves beyond. ...
It highlights how quickly this 'wicked' problem has led to deceptive Nash equilibria of certain information-asymmetric games as well as their sequels of more complex intertwined games at human scale but ...
Signaling games Signaling games are multiplayer (usually, two players) games with incomplete information: specifically, one player is informed and the other player is not. ...
doi:10.1007/s41745-020-00186-1
pmid:33106735
pmcid:PMC7578442
fatcat:ngbxxrcbqbcovifn4znfkd5dyy
Representation and analysis of coordinated attacks
2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering - FMSE '03
analysis, and discuss an implementation of a coordinatedattack graph. ...
In the paper, we define the notion of coordinated-attack graph, propose an algorithm for efficient generation of coordinated-attack graphs, demonstrate how coordinated-attack can be used for vulnerability ...
In order to mislead the intrusion response system, all but one of these attacks are designed to be decoy. ...
doi:10.1145/1035429.1035434
dblp:conf/ccs/BraynovJ03
fatcat:zixctoqgw5hkxfb5huohu3lzm4
Law and logic: A review from an argumentation perspective
2015
Artificial Intelligence
This article reviews legal applications of logic, with a particularly marked concern for logical models of legal argument. ...
Then legal applications of logic are reviewed where legal rules are not just applied but are the object of reasoning and discourse. ...
One such case is Keeble, in which a pond owner placed a duck decoy in his pond with the intention to sell the caught ducks for a living. ...
doi:10.1016/j.artint.2015.06.005
fatcat:r3qsbixofvgrbhkm4dwpajynu4
Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey
2022
Security and Communication Networks
With the increased frequency and intensity of denial-of-service (DoS) attacks on critical cloud-hosted services, resource adaptation schemes adopted by the cloud service providers (CSPs) need to be intelligent ...
However, the existing surveys that seek to explore this space either focus more on MTD for generic cyberattack mitigation or on DoS attack defense on cloud systems. ...
of two components: (i) one that differentiates between the decoy nodes interactions with the adversary and a real node and (ii) another for adversarial game formulation in order to find the attack target ...
doi:10.1155/2022/2223050
fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
[article]
2021
arXiv
pre-print
The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical ...
Our investigation is substantiated by examining two different versions of the game, with and without the re-configuration cost to empower the network administrator to determine optimal honeypot configurations ...
with cross-network access, one-to-many mechanisms and high interaction capabilities replicating a programmable logic controller to gather large-scale attack data. ...
arXiv:2111.02364v1
fatcat:lwnkkebiafe5jasy7pw4226p2a
A Survey of Moving Target Defenses for Network Security
[article]
2020
arXiv
pre-print
In trying to answer the latter question, we showcase the use of domain knowledge and game-theoretic modeling can help the defender come up with effective and efficient movement strategies. ...
We first categorize these defenses into different sub-classes depending on what they move, when they move and how they move. ...
Temporal and spatial diversity have been used to introduce genetic algorithm based MTD by Crouse et al. [71] . ...
arXiv:1905.00964v2
fatcat:tpb6i4zpjnbm3pwdoz3wsckeie
Overview - Fog Computing and Internet-of-Things (IOT)
2017
EAI Endorsed Transactions on Cloud Systems
during execution can be represented a directed graph, Fog resources can be allocated according to the situation from time to time. ...
In Fog, the design issues are: Where to place decoy in fog network? How to design on-demand decoy information to further reduce the amount of stolen data? ...
doi:10.4108/eai.20-12-2017.154378
fatcat:k3qhfv6ppje4lhmplwqbvcvkqi
« Previous
Showing results 1 — 15 out of 97 results