146 Hits in 8.6 sec

Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks [article]

Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, Subbarao Kambhampati
2019 arXiv   pre-print
In this work, we leverage knowledge in attack graphs of a cloud network in formulating a zero-sum Markov Game and use the Common Vulnerability Scoring System (CVSS) to come up with meaningful utility values  ...  Thus, there has been a recent interest in developing Moving Target Defense (MTD) mechanisms that helps one optimize the joint objective of maximizing security while ensuring that the impact on performance  ...  Acknowledgment We thank the reviewers for their insightful comments and constructive feedback.  ... 
arXiv:1812.09660v2 fatcat:5cstdinaxjcttmvh4rcpphar6i

A Survey of Moving Target Defenses for Network Security [article]

Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati
2020 arXiv   pre-print
, and targeted threat models for quantitative evaluation.  ...  In this survey, we analyze the recent advancements made in the development of MTDs and define categorizations that capture the key aspects of such defenses.  ...  Advanced Persistent Threats (APTs) Advanced Persistent Threats (APTs) refers to a distinct set of attacks against a high-value target organization that differs from normal cyber attacks in several ways  ... 
arXiv:1905.00964v2 fatcat:tpb6i4zpjnbm3pwdoz3wsckeie

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy [article]

Jeffrey Pawlick, Edward Colbert, Quanyan Zhu
2019 arXiv   pre-print
In this paper, we survey 24 articles from 2008-2018 that use game theory to model defensive deception for cybersecurity and privacy.  ...  Then we propose a taxonomy that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement.  ...  This could be useful to add a layer to the taxonomy proposed in the present paper. Zhu and Başar [2013] use Markov decision processes to model moving target defense for network security.  ... 
arXiv:1712.05441v3 fatcat:baizt74d2fg37flf57u6e6i25q

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model

Jing-lei Tan, Heng-wei Zhang, Hong-qi Zhang, Cheng Lei, Hui Jin, Bo-wen Li, Hao Hu
2020 Security and Communication Networks  
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to advanced persistent threats (APTs).  ...  Moving target defense, as an effective defense means, is constantly developing.  ...  Introduction With the continuous development of cyberattacks, such as advanced persistent threats (APTs), cybersecurity faces significant challenges [1] . e software-defined network (SDN), as a next-generation  ... 
doi:10.1155/2020/3151495 fatcat:jgchfhfnz5ae3izv3ndhakzt64

Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey

Minh Nguyen, Saptarshi Debroy, AnMin Fu
2022 Security and Communication Networks  
The concept of moving target defense (MTD) has recently emerged as an effective and agile defense mechanism against DoS attacks that particularly target cloud-hosted applications.  ...  We also discuss the non-MTD-based DoS defense strategies for both cloud and non-cloud infrastructures in order to highlight the pros and cons of MTD-based strategies.  ...  Recently, in [35] , Sengupta et al. presented an extensive survey on MTD techniques for advanced persistent threat (APT) [40, 41] in SDN-based cloud environments.  ... 
doi:10.1155/2022/2223050 fatcat:3figtl7ju5ezjbn3gwvzhjxj4e

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
2021 arXiv   pre-print
It closes with an outline of some research directions to tackle major gaps in current defensive deception research.  ...  in defensive deception.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
arXiv:2101.10121v2 fatcat:ko2mzzvyerehnfxbwgeuz72ilu

Three Decades of Deception Techniques in Active Cyber Defense – Retrospect and Outlook [article]

Li Zhang, Vrizlynn L. L. Thing
2021 arXiv   pre-print
In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021.  ...  Deception techniques have been widely seen as a game changer in cyber defense.  ...  sophisticated attacks like Advanced Persistent Threat (APT) based intrusions.  ... 
arXiv:2104.03594v1 fatcat:nihxyw27dbflfmstqgskhn2jie

Dynamic Games for Secure and Resilient Control System Design [article]

Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu
2019 arXiv   pre-print
In this review, we first provide a multi-layer perspective toward increasingly complex and integrated control systems and then introduce several variants of dynamic games for modeling different layers  ...  To this end, game theory provides a bottom-up modeling paradigm to capture the strategic interactions among multiple components of the complex system and enables a holistic view to understand and design  ...  Stuxnet, reported in [5] , [6] , is one of the well-known Advanced Persistent Threats (APTs) to control systems that can persist for a long period, behave stealthily, and specifically target industrial  ... 
arXiv:1910.07510v3 fatcat:4rxeyse6dnbspop7hxalhzcedq

Threat Analysis and Risk Assessment for Connected Vehicles: A Survey

Feng Luo, Yifan Jiang, Zhaojing Zhang, Yi Ren, Shuo Hou, George Drosatos
2021 Security and Communication Networks  
Threat analysis and risk assessment (TARA) is an efficient method to ensure the defense effect and greatly save costs in the early stage of vehicle development.  ...  It analyzes the threat of vehicle systems and determines the hierarchical defense and corresponding mitigations according to the potential threat to the system.  ...  Security and Communication Networks  ... 
doi:10.1155/2021/1263820 fatcat:tai37rizlnhrbehomdi5oe3ofa

SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict

Sang Seo, Dohoon Kim
2021 Electronics  
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers' social-engineering real-time attacks by organization through either structural mutations  ...  or induction and isolation only using static traps.  ...  First, in the game-based foreground, it is used as a preprocessed parameter for generating and updating deception strategies of the defender model in the PBNE-and BSSG-based zero-sum game components and  ... 
doi:10.3390/electronics10233012 fatcat:gvxk4qx6grcxdainz73t5auxyq

Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model [article]

Henger Li, Wen Shen, Zizhan Zheng
2020 arXiv   pre-print
Empirical evaluation on real-world problems demonstrates the advantages of the Markov Stackelberg game model for spatial-temporal moving target defense.  ...  Moving target defense has emerged as a critical paradigm of protecting a vulnerable system against persistent and stealthy attacks.  ...  We would like to thank Sailik Sengupta from the Arizona State University for kindly providing their MIQP code using in BSG with the piecewise linear McCormick envelopes.  ... 
arXiv:2002.10390v1 fatcat:2tv2czpcyrd45h6qnurm632gia

Cyberspace Security Using Adversarial Learning and Conformal Prediction

Harry Wechsler
2015 Intelligent Information Management  
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent  ...  Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted self-managing defensive shield to detect, disrupt, and deny intrusive  ...  advanced persistent threats (APT), and moving target defense (MTD) to increase the time it takes to mount and execute an attack while decreasing the time it takes to deploy defensive moves.  ... 
doi:10.4236/iim.2015.74016 fatcat:wqiu3pkl6zeurlr3mizdahhgd4

An Adversarial Risk Analysis Framework for Cybersecurity

David Rios Insua, Aitor Couce‐Vieira, Jose A. Rubio, Wolter Pieters, Katsiaryna Labunets, Daniel G. Rasines
2019 Risk Analysis  
We propose a comprehensive framework for cybersecurity risk analysis, covering the presence of both intentional and nonintentional threats and the use of insurance as part of the security portfolio.  ...  Risk analysis is an essential methodology for cybersecurity as it allows organizations to deal with cyber threats potentially affecting them, prioritize the defense of their assets, and decide what security  ...  Other intentional attacks, not modeled here, could include launching an advanced persistent threat, instigating the misbehaviour of insiders, or the use of bombs.  ... 
doi:10.1111/risa.13331 pmid:31183890 fatcat:3rpykbvks5c3bfajpu5dehblte

Reinforcement Learning for Feedback-Enabled Cyber Resilience [article]

Yunhan Huang, Linan Huang, Quanyan Zhu
2021 arXiv   pre-print
We introduce three application domains of CRMs: moving target defense, defensive cyber deception, and assistive human security technologies. The RL algorithms also have vulnerabilities themselves.  ...  A Cyber-Resilient Mechanism (CRM) adapts to the known or zero-day threats and uncertainties in real-time and strategically responds to them to maintain critical functions of the cyber systems in the event  ...  Advanced Persistent Threats (APTs) [3] are one of such threats that are known for their stealthiness, intelligence, and persistence.  ... 
arXiv:2107.00783v2 fatcat:faffbbapnrg5djpjhjq7rcb7ym

Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS

Felix O. Olowononi, Danda B. Rawat, Chunmei Liu
2020 IEEE Communications Surveys and Tutorials  
Most research work have therefore focused on the detection of attacks in CPS.  ...  Furthermore, with this paper, readers can have a thorough understanding of recent advances on ML-based security and securing ML for CPS and countermeasures, as well as research trends in this active research  ...  The use of GAN was also proposed for identifying security anomalies and cyber threats in the self-organizing networks of CPS [105] .  ... 
doi:10.1109/comst.2020.3036778 fatcat:tyrz76ofxfejha5kwhoptv2hwu
« Previous Showing results 1 — 15 out of 146 results