Filters








90 Hits in 6.6 sec

Moving Target Defense for Web Applications using Bayesian Stackelberg Games [article]

Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
2016 arXiv   pre-print
To address this issue, we propose modeling of a real-world MTD web application as a repeated Bayesian game.  ...  Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between multiple  ...  ACKNOWLEDGMENTS This work was partially supported by the grants from National Science Foundation (NSF-SFS-1129561) and the Center for Cybersecurity and Digital Forensics at Arizona State University.  ... 
arXiv:1602.07024v3 fatcat:labcdvt3undznnmvqfjvuir4p4

Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense [article]

Sailik Sengupta, Subbarao Kambhampati
2020 arXiv   pre-print
To take away an attacker's advantage of reconnaissance, researchers have proposed proactive defense methods such as Moving Target Defense (MTD).  ...  We show that our learning approach converges to an SSE of a BSMG and then highlight that the learned movement policy (1) improves the state-of-the-art in MTD for web-application security and (2) converges  ...  Moving Target Defense for Web-applications As mentioned earlier, we borrow the game domain from [6] to build the simulator.  ... 
arXiv:2007.10457v1 fatcat:ddz3g2cezza57lhf3tdhtdkwxa

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
2021 arXiv   pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources.  ...  This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.  ... 
arXiv:2101.10121v2 fatcat:ko2mzzvyerehnfxbwgeuz72ilu

Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model [article]

Henger Li, Wen Shen, Zizhan Zheng
2020 arXiv   pre-print
Empirical evaluation on real-world problems demonstrates the advantages of the Markov Stackelberg game model for spatial-temporal moving target defense.  ...  Moving target defense has emerged as a critical paradigm of protecting a vulnerable system against persistent and stealthy attacks.  ...  We would like to thank Sailik Sengupta from the Arizona State University for kindly providing their MIQP code using in BSG with the piecewise linear McCormick envelopes.  ... 
arXiv:2002.10390v1 fatcat:2tv2czpcyrd45h6qnurm632gia

Using Game Theory in Public Domains: The Potential and Limitations of Security Games

Zuzana Špačková, David Špaček
2020 NISPAcee Journal of Public Administration and Policy  
The paper deals with the model of a Stackelberg security game and its real-world applications in security domains.  ...  The main aim and purpose of the paper is to provide a survey of selected cases of real-world deployed applications of the game-theoretic Stackelberg model in the area of public security and, based on the  ...  All these real-world deployed applications are based on the general model of the Bayesian Stackelberg security game using more or less important modifi cations of or adjustments to it.  ... 
doi:10.2478/nispa-2020-0024 fatcat:aff4p7wphzfabiimf4ahhxr6gu

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks.  ...  The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek for developing proactive, adaptive MTD mechanisms.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

Game Theory for Network Security

Xiannuan Liang, Yang Xiao
2013 IEEE Communications Surveys and Tutorials  
In this paper, we review the existing game-theory based solutions for network security problems, classifying their application scenarios under two categories, attack-defense analysis and security measurement  ...  Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks.  ...  c) Discussions on advantages and drawbacks on the applications for attack-defense analysis The advantages of the applications of game theory for general analysis of attack-defense interaction are its simplicity  ... 
doi:10.1109/surv.2012.062612.00056 fatcat:wn7l3y2sgvaqvaneotfzhaxzoy

Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges [article]

Bowei Xi
2021 arXiv   pre-print
Then the corresponding defense approaches are introduced along with the weakness and limitations of the existing defense approaches.  ...  We provide a comprehensive overview of adversarial machine learning focusing on two application domains, i.e., cybersecurity and computer vision.  ...  The game was formulated as multiple lower level Stackelberg games and one upper level Bayesian Stackelberg game.  ... 
arXiv:2107.02894v1 fatcat:ir7vzxh3wfaddcmgezqtyxu7iy

Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars

Maxime Ayrault, Ulrich Kühne, Étienne Borde
2022 Information  
However, resource constraints and losses in quality of service need to be taken into account for such Moving Target Defenses (MTDs).  ...  In this article, we present a game-theoretic model that can be used to compute an optimal MTD defense for a critical embedded system that is facing several attackers with different objectives.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable.  ... 
doi:10.3390/info13050242 fatcat:4zbpjrdrb5hzthlbjgpqnxs7nm

SoK: Applying Machine Learning in Security - A Survey [article]

Heju Jiang, Jasvir Nagra, Parvez Ahammad
2016 arXiv   pre-print
pioneering ML applications in security.  ...  We examine the generalized system designs, underlying assumptions, measurements, and use cases in active research.  ...  We emphasize a position which treats security as a game theory problem.  ... 
arXiv:1611.03186v1 fatcat:hfvc5hhu7ze77lrnjufslcg6gm

SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict

Sang Seo, Dohoon Kim
2021 Electronics  
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers' social-engineering real-time attacks by organization through either structural mutations  ...  or induction and isolation only using static traps.  ...  [35, 46] have proposed a Bayesian Stackelberg game to optimize the deployment of security systems in the web and cloud.  ... 
doi:10.3390/electronics10233012 fatcat:gvxk4qx6grcxdainz73t5auxyq

Development and analysis of game-theoretical models of security systems agents interaction

Serhii Yevseiev, Oleksandr Milov, Stanislav Milevskyi, Oleksandr Voitko, Maksym Kasianenko, Yevgen Melenti, Serhii Pohasii, Hrygorii Stepanov, Oleksandr Turinskyi, Serhii Faraon
2020 Eastern-European Journal of Enterprise Technologies  
So, for the defense side, the strategy may be «Wait and See», and for the side of the attack, «the weakest link» 6 Game with full information A game in which each player knows the moves of all other players  ...  Such games are called Bayesian games because of the use of Bayesian analysis in predicting the result, which may be characteristic of modeling the reflective behavior of one side or another in cyber conflict  ... 
doi:10.15587/1729-4061.2020.201418 fatcat:qvro55stizhnxcgredv6e5xll4

Moving Target Defense Techniques: A Survey

Cheng Lei, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, Xiao-Hu Liu
2018 Security and Communication Networks  
After that, the applications of moving target defense in different network architectures are illustrated.  ...  In order to gain better understanding of moving target defense, background knowledge and inspiration are expounded at first. Based on it, the concept of moving target defense is analyzed.  ...  [42] proposed Bayesian Stackelberg dynamic game model to select strategy in generalized network confrontation with MTD.  ... 
doi:10.1155/2018/3759626 fatcat:4ywagqoxhbeyhpxjhtuienvvea

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, Jung Taek Seo
2022 Sensors  
In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics.  ...  These strategies can be used in various situations in Defensive Deception technologies.  ...  To design the interaction among both MT Deep and users, they used a Bayesian Stackelberg Game.  ... 
doi:10.3390/s22062194 pmid:35336373 pmcid:PMC8952217 fatcat:hgtvnjuzxfgudpa76fke433qhy

A cost-effective shuffling method against DDoS attacks using Moving Target Defense [article]

Yu-Yang Zhou, Guang Cheng
2019 arXiv   pre-print
Moving Target Defense(MTD) has emerged as a good solution to alter the asymmetric situation of attacks and defenses, shuffling-based moving target defense has been regarded as one of the most effective  ...  In this paper, therefore, we propose a novel cost-effective shuffling method against DDoS attacks using MTD.  ...  [15] proposed a Bayesian Stackelberg game that models the joint migration and signaling strategies for the defender in the face of a strategic and rational attacker and demonstrated that MTD can be  ... 
arXiv:1903.10102v2 fatcat:bga3fmmptzevhgc4ih3b7bnu4u
« Previous Showing results 1 — 15 out of 90 results