2,464 Hits in 12.0 sec

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
2021 arXiv   pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources.  ...  This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
arXiv:2101.10121v2 fatcat:ko2mzzvyerehnfxbwgeuz72ilu

A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

Slavica V. Bostjancic Rakas, Mirjana D. Stojanovic, Jasna D. Markovic-Petrovic
2020 IEEE Access  
Based on that, we provide a brief description and evaluation of 26 selected research papers, published in the period 2015-2019.  ...  To achieve these objectives, we start from the factors that impact the design of dedicated intrusion detection systems in SCADA networks and focus on network-based IDS solutions.  ...  Similarly, Murray et al. outlined a number of publicly disclosed SCADA vulnerabilities, in addition to approaches for detecting attacks in operational networks [27] .  ... 
doi:10.1109/access.2020.2994961 fatcat:pid6aq5t7be7hkf4moaym2wqti

A Survey of Game Theory as Applied to Network Security

Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu
2010 2010 43rd Hawaii International Conference on System Sciences  
This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions.  ...  Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades.  ...  [34] proposed a game theoretic approach to model intrusion detection in mobile ad-hoc networks.  ... 
doi:10.1109/hicss.2010.35 dblp:conf/hicss/RoyESDSW10 fatcat:hom3hguma5a4nji65wdcoiseoq

Bayesian Network Model for a Zimbabwean Cybersecurity System

Gabriel Kabanda
2020 Oriental journal of computer science and technology  
The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity.  ...  What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity.  ...  Funding The author(s) received no financial support for the research, authorship, and/or publication of this article.  ... 
doi:10.13005/ojcst12.04.02 fatcat:4cjgunib55cwtntjnebgpmrgsi

Nudge: Intermediaries' Role in Interdependent Network Security [chapter]

Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang
2010 Lecture Notes in Computer Science  
We discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies (pay for effort).  ...  By employing an interdependent security game-theoretic framework, we study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness  ...  Second, there is a lack of historical actuarial data or reliable models for cyber-risk evaluation causing high-priced premiums.  ... 
doi:10.1007/978-3-642-13869-0_24 fatcat:7ufbpaxecjgcddtintln56i5wq

Corporate Role in Protecting Consumers from the Risk of Identity Theft

Omondi John Opala, Syed (Shawon) M. Rahman
2013 International Journal of Computer Networks & Communications  
This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations  ...  The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse.  ...  A consumer survey on security risks and vulnerabilities for online purchases showed that the lack of security awareness was among reasons for the rise in cyber based attacks as summarized in table below  ... 
doi:10.5121/ijcnc.2013.5502 fatcat:5zlneok2rnc4xoa6kr5ivvycsm

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User

Fiona Carroll, Phil Legg, Bastian Bonkel
2020 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)  
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis  ...  12:00 -13:00 Coffee Break & Social Networking 13:00 -13:30 Using Amazon Alexa APIs as a Source of Digital Evidence Clemens Krueger and Sean McKeown A Taxonomy of Approaches for Integrating Attack Awareness  ...  He is experienced in Cyber Security, Machine Learning, Data Fusion, Intrusion Detection Systems and Computer Network Defence.  ... 
doi:10.1109/cybersa49311.2020.9139668 dblp:conf/cybersa/CarrollLB20 fatcat:mtrvk2uvknadrosalvit4xz67i

Explorations in Cyber International Relations (ECIR) - Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System

Stuart E. Madnick, Nazli Choucri, Steven Camina, Erik Fogg, Xitong Li, Wei Fan
2009 Social Science Research Network  
Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective  ...  Since then, the number of CERTs worldwide has grown dramatically, leading to the potential for a sophisticated and coordinated global cybersecurity response network.  ...  As the data was intended for strategic use, we believe it to be highly trustworthy.  ... 
doi:10.2139/ssrn.1477618 fatcat:v56zkracknei3hmxouoh6vpsji

A Survey of Moving Target Defenses for Network Security [article]

Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati
2020 arXiv   pre-print
In this survey, we analyze the recent advancements made in the development of MTDs and define categorizations that capture the key aspects of such defenses.  ...  Network defenses based on traditional tools, techniques, and procedures fail to account for the attacker's inherent advantage present due to the static nature of network services and configurations.  ...  A. Related Works and the Need for this Survey We present a comparison of our survey to existing surveys in Table I .  ... 
arXiv:1905.00964v2 fatcat:tpb6i4zpjnbm3pwdoz3wsckeie

Cyber-Attack Detection and Mitigation Using SVM for 5G Network

Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Abdul Rahman AlShehri
2022 Intelligent Automation and Soft Computing  
All enterprises are constantly exposed to a variety of risks. Also implemented an efficient SVM-based attack detection and mitigation system for 5G network.  ...  The security solutions are fast and effective in detecting and mitigating cyber-attacks.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/iasc.2022.019121 fatcat:j7xr2inchzfjzdzgvuakncui4i

A Systematic Mapping Study on Cyber Security Indicator Data

Per Håkon Meland, Shukun Tokas, Gencer Erdogan, Karin Bernsmed, Aida Omerovic
2021 Electronics  
While these indicators can give valuable information about the contemporary cyber risk, the increasing usage of unconventional data sources and threat intelligence feeds of more strategic and tactical  ...  A security indicator is a sign that shows us what something is like or how a situation is changing and can aid us in making informed estimations on cyber risks.  ...  In terms of trends for data sources, we see an increasing number of papers using system, network and unconventional data sources.  ... 
doi:10.3390/electronics10091092 fatcat:anzyvqeeajgmbo4twp7ripynce

Enabling exercises, education and research with a comprehensive cyber range

Maria Leitner, Maximilian Frank, Gregor Langner, Max Landauer, Florian Skopik, Paul Smith, Benjamin Akhras, Wolfgang Hotwagner, Stela Kucek, Timea Pahi, Lenhard Reuter, Manuel Warum
2021 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
With the continuous rise of threat actors and attacks, it is even more imminent to create cyber ranges, for example as training and exercise environment, that contribute to the modern challenges of a digital  ...  In the past 15 years, virtual environments that simulate a diverse set of information technology (IT) and operational technology (OT) infrastructures, further called cyber ranges, have been developed.  ...  Laura Bassi 4.0 is a research, technology and innovation funding programme processed by the Austrian Research Promotion Agency, with kind support of the Federal Ministry for Digital and Economic Affairs  ... 
doi:10.22667/jowua.2021.12.31.037 dblp:journals/jowua/LeitnerFLLSSAHK21 fatcat:ug6b2yyuendftm6xv3q2bezxdu

How Businesses Can Promote Cyber Peace

Scott Shackelford, Timothy L. Fort, Jamie Darin Prenkert
2014 Social Science Research Network  
their managers and boards of directors, are at the epicenter of this storm, but so far surveys have revealed that few businesses are taking the necessary steps to safeguard their private data and enhance  ...  Multifaceted cyber threats are increasingly impacting the bottom lines of firms, and spilling over into larger issues of geopolitical importance, including international security. 1 Firms, and in particular  ...  It is difficult to say, though, how the number and type of cyber attacks on the private sector have changed over time given inconsistencies in survey data.  ... 
doi:10.2139/ssrn.2393528 fatcat:m6mgdufanfc2hbnjibakpsmowi

Insurability of Cyber Risk: An Empirical Analysis

Christian Biener, Martin Eling, Jan Hendrik Wirfs
2015 Social Science Research Network  
9 or risk resulting in failure of information systems. 10 The term "cyber" is short for the word cyberspace, which is generally understood as the interactive domain composed of all digital networks used  ...  These problems hinder the development of a sustainable cyber insurance market. We finish by discussing how cyber risk exposure may be better managed and make several suggestions for future research.  ...  with positive externalities; problem of proving source of loss and in the detection of perpetrators; screening and deductibles to mitigate moral hazard -Adverse selection, i.e., firms that have experienced  ... 
doi:10.2139/ssrn.2577286 fatcat:65jo7z5ggvgxjlpyhusph52lyu

Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey

Minh Nguyen, Saptarshi Debroy, AnMin Fu
2022 Security and Communication Networks  
We also take an in-depth look at the testbed implementations and resilience and performance evaluations of MTD approaches.  ...  In this survey, we particularly provide an in-depth analysis on how MTD can help recover critical cloud assets in the face of DoS attacks and how emerging programmable technologies such as software-defined  ...  Before the cloud era, most of the enterprise assets in terms of services and data were stored in dedicated physical hardware-the bigger the enterprise assets, the greater the need for such physical resources  ... 
doi:10.1155/2022/2223050 fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
« Previous Showing results 1 — 15 out of 2,464 results