A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Moving Target Defense for Web Applications using Bayesian Stackelberg Games
[article]
2016
arXiv
pre-print
To address this issue, we propose modeling of a real-world MTD web application as a repeated Bayesian game. ...
Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between multiple ...
ACKNOWLEDGMENTS This work was partially supported by the grants from National Science Foundation (NSF-SFS-1129561) and the Center for Cybersecurity and Digital Forensics at Arizona State University. ...
arXiv:1602.07024v3
fatcat:labcdvt3undznnmvqfjvuir4p4
Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense
[article]
2020
arXiv
pre-print
To take away an attacker's advantage of reconnaissance, researchers have proposed proactive defense methods such as Moving Target Defense (MTD). ...
We show that our learning approach converges to an SSE of a BSMG and then highlight that the learned movement policy (1) improves the state-of-the-art in MTD for web-application security and (2) converges ...
Moving Target Defense for Web-applications As mentioned earlier, we borrow the game domain from [6] to build the simulator. ...
arXiv:2007.10457v1
fatcat:ddz3g2cezza57lhf3tdhtdkwxa
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
[article]
2021
arXiv
pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. ...
This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed ...
Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein. ...
arXiv:2101.10121v2
fatcat:ko2mzzvyerehnfxbwgeuz72ilu
Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model
[article]
2020
arXiv
pre-print
Empirical evaluation on real-world problems demonstrates the advantages of the Markov Stackelberg game model for spatial-temporal moving target defense. ...
Moving target defense has emerged as a critical paradigm of protecting a vulnerable system against persistent and stealthy attacks. ...
We would like to thank Sailik Sengupta from the Arizona State University for kindly providing their MIQP code using in BSG with the piecewise linear McCormick envelopes. ...
arXiv:2002.10390v1
fatcat:2tv2czpcyrd45h6qnurm632gia
Using Game Theory in Public Domains: The Potential and Limitations of Security Games
2020
NISPAcee Journal of Public Administration and Policy
The paper deals with the model of a Stackelberg security game and its real-world applications in security domains. ...
The main aim and purpose of the paper is to provide a survey of selected cases of real-world deployed applications of the game-theoretic Stackelberg model in the area of public security and, based on the ...
All these real-world deployed applications are based on the general model of the Bayesian Stackelberg security game using more or less important modifi cations of or adjustments to it. ...
doi:10.2478/nispa-2020-0024
fatcat:aff4p7wphzfabiimf4ahhxr6gu
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
[article]
2019
arXiv
pre-print
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks. ...
The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek for developing proactive, adaptive MTD mechanisms. ...
Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. ...
arXiv:1909.08092v1
fatcat:wsycpvaqgzdcvboagxlbg5x6uu
Game Theory for Network Security
2013
IEEE Communications Surveys and Tutorials
In this paper, we review the existing game-theory based solutions for network security problems, classifying their application scenarios under two categories, attack-defense analysis and security measurement ...
Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks. ...
c) Discussions on advantages and drawbacks on the applications for attack-defense analysis The advantages of the applications of game theory for general analysis of attack-defense interaction are its simplicity ...
doi:10.1109/surv.2012.062612.00056
fatcat:wn7l3y2sgvaqvaneotfzhaxzoy
Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges
[article]
2021
arXiv
pre-print
Then the corresponding defense approaches are introduced along with the weakness and limitations of the existing defense approaches. ...
We provide a comprehensive overview of adversarial machine learning focusing on two application domains, i.e., cybersecurity and computer vision. ...
The game was formulated as multiple lower level Stackelberg games and one upper level Bayesian Stackelberg game. ...
arXiv:2107.02894v1
fatcat:ir7vzxh3wfaddcmgezqtyxu7iy
Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars
2022
Information
However, resource constraints and losses in quality of service need to be taken into account for such Moving Target Defenses (MTDs). ...
In this article, we present a game-theoretic model that can be used to compute an optimal MTD defense for a critical embedded system that is facing several attackers with different objectives. ...
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. ...
doi:10.3390/info13050242
fatcat:4zbpjrdrb5hzthlbjgpqnxs7nm
SoK: Applying Machine Learning in Security - A Survey
[article]
2016
arXiv
pre-print
pioneering ML applications in security. ...
We examine the generalized system designs, underlying assumptions, measurements, and use cases in active research. ...
We emphasize a position which treats security as a game theory problem. ...
arXiv:1611.03186v1
fatcat:hfvc5hhu7ze77lrnjufslcg6gm
SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict
2021
Electronics
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers' social-engineering real-time attacks by organization through either structural mutations ...
or induction and isolation only using static traps. ...
[35, 46] have proposed a Bayesian Stackelberg game to optimize the deployment of security systems in the web and cloud. ...
doi:10.3390/electronics10233012
fatcat:gvxk4qx6grcxdainz73t5auxyq
Development and analysis of game-theoretical models of security systems agents interaction
2020
Eastern-European Journal of Enterprise Technologies
So, for the defense side, the strategy may be «Wait and See», and for the side of the attack, «the weakest link» 6 Game with full information A game in which each player knows the moves of all other players ...
Such games are called Bayesian games because of the use of Bayesian analysis in predicting the result, which may be characteristic of modeling the reflective behavior of one side or another in cyber conflict ...
doi:10.15587/1729-4061.2020.201418
fatcat:qvro55stizhnxcgredv6e5xll4
Moving Target Defense Techniques: A Survey
2018
Security and Communication Networks
After that, the applications of moving target defense in different network architectures are illustrated. ...
In order to gain better understanding of moving target defense, background knowledge and inspiration are expounded at first. Based on it, the concept of moving target defense is analyzed. ...
[42] proposed Bayesian Stackelberg dynamic game model to select strategy in generalized network confrontation with MTD. ...
doi:10.1155/2018/3759626
fatcat:4ywagqoxhbeyhpxjhtuienvvea
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions
2022
Sensors
In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. ...
These strategies can be used in various situations in Defensive Deception technologies. ...
To design the interaction among both MT Deep and users, they used a Bayesian Stackelberg Game. ...
doi:10.3390/s22062194
pmid:35336373
pmcid:PMC8952217
fatcat:hgtvnjuzxfgudpa76fke433qhy
A cost-effective shuffling method against DDoS attacks using Moving Target Defense
[article]
2019
arXiv
pre-print
Moving Target Defense(MTD) has emerged as a good solution to alter the asymmetric situation of attacks and defenses, shuffling-based moving target defense has been regarded as one of the most effective ...
In this paper, therefore, we propose a novel cost-effective shuffling method against DDoS attacks using MTD. ...
[15] proposed a Bayesian Stackelberg game that models the joint migration and signaling strategies for the defender in the face of a strategic and rational attacker and demonstrated that MTD can be ...
arXiv:1903.10102v2
fatcat:bga3fmmptzevhgc4ih3b7bnu4u
« Previous
Showing results 1 — 15 out of 90 results