A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
[article]
2021
arXiv
pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. ...
This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory ...
arXiv:2101.10121v2
fatcat:ko2mzzvyerehnfxbwgeuz72ilu
A Review of Research Work on Network-Based SCADA Intrusion Detection Systems
2020
IEEE Access
Based on that, we provide a brief description and evaluation of 26 selected research papers, published in the period 2015-2019. ...
To achieve these objectives, we start from the factors that impact the design of dedicated intrusion detection systems in SCADA networks and focus on network-based IDS solutions. ...
Similarly, Murray et al. outlined a number of publicly disclosed SCADA vulnerabilities, in addition to approaches for detecting attacks in operational networks [27] . ...
doi:10.1109/access.2020.2994961
fatcat:pid6aq5t7be7hkf4moaym2wqti
A Survey of Game Theory as Applied to Network Security
2010
2010 43rd Hawaii International Conference on System Sciences
This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions. ...
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades. ...
[34] proposed a game theoretic approach to model intrusion detection in mobile ad-hoc networks. ...
doi:10.1109/hicss.2010.35
dblp:conf/hicss/RoyESDSW10
fatcat:hom3hguma5a4nji65wdcoiseoq
Bayesian Network Model for a Zimbabwean Cybersecurity System
2020
Oriental journal of computer science and technology
The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. ...
What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. ...
Funding The author(s) received no financial support for the research, authorship, and/or publication of this article. ...
doi:10.13005/ojcst12.04.02
fatcat:4cjgunib55cwtntjnebgpmrgsi
Nudge: Intermediaries' Role in Interdependent Network Security
[chapter]
2010
Lecture Notes in Computer Science
We discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies (pay for effort). ...
By employing an interdependent security game-theoretic framework, we study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness ...
Second, there is a lack of historical actuarial data or reliable models for cyber-risk evaluation causing high-priced premiums. ...
doi:10.1007/978-3-642-13869-0_24
fatcat:7ufbpaxecjgcddtintln56i5wq
Corporate Role in Protecting Consumers from the Risk of Identity Theft
2013
International Journal of Computer Networks & Communications
This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations ...
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. ...
A consumer survey on security risks and vulnerabilities for online purchases showed that the lack of security awareness was among reasons for the rise in cyber based attacks as summarized in table below ...
doi:10.5121/ijcnc.2013.5502
fatcat:5zlneok2rnc4xoa6kr5ivvycsm
The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User
2020
2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis ...
12:00 -13:00 Coffee Break & Social Networking 13:00 -13:30 Using Amazon Alexa APIs as a Source of Digital Evidence Clemens Krueger and Sean McKeown A Taxonomy of Approaches for Integrating Attack Awareness ...
He is experienced in Cyber Security, Machine Learning, Data Fusion,
Intrusion Detection Systems and Computer Network Defence. ...
doi:10.1109/cybersa49311.2020.9139668
dblp:conf/cybersa/CarrollLB20
fatcat:mtrvk2uvknadrosalvit4xz67i
Explorations in Cyber International Relations (ECIR) - Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System
2009
Social Science Research Network
Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective ...
Since then, the number of CERTs worldwide has grown dramatically, leading to the potential for a sophisticated and coordinated global cybersecurity response network. ...
As the data was intended for strategic use, we believe it to be highly trustworthy. ...
doi:10.2139/ssrn.1477618
fatcat:v56zkracknei3hmxouoh6vpsji
A Survey of Moving Target Defenses for Network Security
[article]
2020
arXiv
pre-print
In this survey, we analyze the recent advancements made in the development of MTDs and define categorizations that capture the key aspects of such defenses. ...
Network defenses based on traditional tools, techniques, and procedures fail to account for the attacker's inherent advantage present due to the static nature of network services and configurations. ...
A. Related Works and the Need for this Survey We present a comparison of our survey to existing surveys in Table I . ...
arXiv:1905.00964v2
fatcat:tpb6i4zpjnbm3pwdoz3wsckeie
Cyber-Attack Detection and Mitigation Using SVM for 5G Network
2022
Intelligent Automation and Soft Computing
All enterprises are constantly exposed to a variety of risks. Also implemented an efficient SVM-based attack detection and mitigation system for 5G network. ...
The security solutions are fast and effective in detecting and mitigating cyber-attacks. ...
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study. ...
doi:10.32604/iasc.2022.019121
fatcat:j7xr2inchzfjzdzgvuakncui4i
A Systematic Mapping Study on Cyber Security Indicator Data
2021
Electronics
While these indicators can give valuable information about the contemporary cyber risk, the increasing usage of unconventional data sources and threat intelligence feeds of more strategic and tactical ...
A security indicator is a sign that shows us what something is like or how a situation is changing and can aid us in making informed estimations on cyber risks. ...
In terms of trends for data sources, we see an increasing number of papers using system, network and unconventional data sources. ...
doi:10.3390/electronics10091092
fatcat:anzyvqeeajgmbo4twp7ripynce
Enabling exercises, education and research with a comprehensive cyber range
2021
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
With the continuous rise of threat actors and attacks, it is even more imminent to create cyber ranges, for example as training and exercise environment, that contribute to the modern challenges of a digital ...
In the past 15 years, virtual environments that simulate a diverse set of information technology (IT) and operational technology (OT) infrastructures, further called cyber ranges, have been developed. ...
Laura Bassi 4.0 is a research, technology and innovation funding programme processed by the Austrian Research Promotion Agency, with kind support of the Federal Ministry for Digital and Economic Affairs ...
doi:10.22667/jowua.2021.12.31.037
dblp:journals/jowua/LeitnerFLLSSAHK21
fatcat:ug6b2yyuendftm6xv3q2bezxdu
How Businesses Can Promote Cyber Peace
2014
Social Science Research Network
their managers and boards of directors, are at the epicenter of this storm, but so far surveys have revealed that few businesses are taking the necessary steps to safeguard their private data and enhance ...
Multifaceted cyber threats are increasingly impacting the bottom lines of firms, and spilling over into larger issues of geopolitical importance, including international security. 1 Firms, and in particular ...
It is difficult to say, though, how the number and type of cyber attacks on the private sector have changed over time given inconsistencies in survey data. ...
doi:10.2139/ssrn.2393528
fatcat:m6mgdufanfc2hbnjibakpsmowi
Insurability of Cyber Risk: An Empirical Analysis
2015
Social Science Research Network
9 or risk resulting in failure of information systems. 10 The term "cyber" is short for the word cyberspace, which is generally understood as the interactive domain composed of all digital networks used ...
These problems hinder the development of a sustainable cyber insurance market. We finish by discussing how cyber risk exposure may be better managed and make several suggestions for future research. ...
with positive externalities; problem of proving source of loss and in the detection of perpetrators; screening and deductibles to mitigate moral hazard -Adverse selection, i.e., firms that have experienced ...
doi:10.2139/ssrn.2577286
fatcat:65jo7z5ggvgxjlpyhusph52lyu
Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey
2022
Security and Communication Networks
We also take an in-depth look at the testbed implementations and resilience and performance evaluations of MTD approaches. ...
In this survey, we particularly provide an in-depth analysis on how MTD can help recover critical cloud assets in the face of DoS attacks and how emerging programmable technologies such as software-defined ...
Before the cloud era, most of the enterprise assets in terms of services and data were stored in dedicated physical hardware-the bigger the enterprise assets, the greater the need for such physical resources ...
doi:10.1155/2022/2223050
fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
« Previous
Showing results 1 — 15 out of 2,464 results