Filters








470 Hits in 8.5 sec

Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System [article]

Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam
<span title="2018-10-13">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Towards that end, we learn an adversarial alert generation policy that is a best response to the defender inspection policy.  ...  Large organizations operate a Cyber Security Operation Center (CSOC), which form the first line of cyber-defense. The inspection of cyber-alerts is a critical part of CSOC operations.  ...  Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1810.05921v1">arXiv:1810.05921v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z45hqufitzbljjadfimzpcqdje">fatcat:z45hqufitzbljjadfimzpcqdje</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826101414/https://arxiv.org/pdf/1810.05921v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/fa/a9fa3f14b48b398b48b5b27640d65dbd01cfccc3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1810.05921v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Game-Theoretic Decision Support for Cyber Forensic Investigations

Antonia Nisioti, George Loukas, Stefan Rass, Emmanouil Panaousis
<span title="2021-08-05">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players.  ...  The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution  ...  Thus, a decision support system that aims to optimise a cyber forensic investigation process can be benefited from investigating the strategic nature of adversaries.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21165300">doi:10.3390/s21165300</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34450740">pmid:34450740</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC8401095/">pmcid:PMC8401095</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/crwagd4655aerevont3na47wce">fatcat:crwagd4655aerevont3na47wce</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210806125029/https://res.mdpi.com/d_attachment/sensors/sensors-21-05300/article_deploy/sensors-21-05300-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/67/1c67cb13ebd3f8b488ca0ac40ee0cc7685402be8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21165300"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8401095" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts

Aaron Schlenker, Haifeng Xu, Mina Guirguis, Christopher Kiekintveld, Arunesh Sinha, Milind Tambe, Solomon Sonya, Darryl Balderas, Noah Dunstatter
<span title="">2017</span> <i title="International Joint Conferences on Artificial Intelligence Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vfwwmrihanevtjbbkti2kc3nke" style="color: black;">Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence</a> </i> &nbsp;
This trend is expected to continue into the future creating a need for tools which find optimal assignments of the incoming alerts to analysts in the presence of a strategic adversary.  ...  These networks have Intrusion Detection and Prevention Systems in place to protect them, but they are notorious for producing a high volume of alerts.  ...  Department of Homeland Security Summer Research Team program.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24963/ijcai.2017/54">doi:10.24963/ijcai.2017/54</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ijcai/SchlenkerXGKSTS17.html">dblp:conf/ijcai/SchlenkerXGKSTS17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hfhzpf3osbh75pn7juuy6wdmmu">fatcat:hfhzpf3osbh75pn7juuy6wdmmu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721144732/https://www.ijcai.org/proceedings/2017/0054.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/03/e4/03e4db5973d116b89d13fb0b29d1af1d43afc514.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24963/ijcai.2017/54"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Stackelberg Security Games: Looking Beyond a Decade of Success

Arunesh Sinha, Fei Fang, Bo An, Christopher Kiekintveld, Milind Tambe
<span title="">2018</span> <i title="International Joint Conferences on Artificial Intelligence Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vfwwmrihanevtjbbkti2kc3nke" style="color: black;">Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence</a> </i> &nbsp;
Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world.  ...  The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago.  ...  Moreover, the adversaries in such games cannot be expected to be completely strategic so behavioral adversary models play an important role.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24963/ijcai.2018/775">doi:10.24963/ijcai.2018/775</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ijcai/SinhaFAKT18.html">dblp:conf/ijcai/SinhaFAKT18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vdiyb6i46jfwhm5dlhjph4cjme">fatcat:vdiyb6i46jfwhm5dlhjph4cjme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190228134827/http://pdfs.semanticscholar.org/92fd/f3e4ba992a5484171f5e2c1633457e1feee0.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/fd/92fdf3e4ba992a5484171f5e2c1633457e1feee0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24963/ijcai.2018/775"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Markov game theoretic data fusion approach for cyber situational awareness

Dan Shen, Genshe Chen, Jose B. Cruz, Jr., Leonard Haynes, Martin Kruger, Erik Blasch, Belur V. Dasarathy
<span title="2007-04-09">2007</span> <i title="SPIE"> Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2007 </i> &nbsp;
A Markov (Stochastic) game method is used to estimate the belief of each possible cyber attack pattern.  ...  This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense.  ...  SIMULATION AND VISUALIZATION TOOL To evaluate our game theoretic approach for cyber attack prediction and mitigation, we have constructed a Cyber Game Simulation Platform (CGSP) based on an open-source  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.720090">doi:10.1117/12.720090</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hr3peq5hozgg7gg3nphllt3vn4">fatcat:hr3peq5hozgg7gg3nphllt3vn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090625175221/http://www.ece.osu.edu/~cruz/Papers/C135-1123146A-62B3-D9B8-9C38E63A54054203-1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/4e/f14e73aeaa74bc3c70b2c8fb883485357ec9830e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.720090"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security

Apostolis Zarras
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/24doe4p5ejdfnajx2acqpe3uxy" style="color: black;">2014 International Carnahan Conference on Security Technology (ICCST)</a> </i> &nbsp;
Unfortunately, cyber-criminals are becoming aware of this type of detection and create evasion techniques that allow them to behave in a benign way when they feel to be threatened.  ...  Consequently, the users that use SCARECROW for Web surfing can remain protected, even if they visit a malicious Website.  ...  One particular case is when the user tries to play an online flash game that requires input from the user's mouse movements.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccst.2014.6987017">doi:10.1109/ccst.2014.6987017</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iccst/Zarras14.html">dblp:conf/iccst/Zarras14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eimhx3ds2bbfbih5ttynwh6ydq">fatcat:eimhx3ds2bbfbih5ttynwh6ydq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706055158/https://www.sec.in.tum.de/assets/Uploads/scarecrow.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cb/a1/cba158dd6aacd99e5f1d8085027e227c038164a5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccst.2014.6987017"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
<span title="2021-05-08">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources.  ...  This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2101.10121v2">arXiv:2101.10121v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ko2mzzvyerehnfxbwgeuz72ilu">fatcat:ko2mzzvyerehnfxbwgeuz72ilu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210512152954/https://arxiv.org/pdf/2101.10121v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/53/8053fe5e4462f66fb76a3d8705abd04f94357f84.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2101.10121v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Facing Multiple Attacks in Adversarial Patrolling Games with Alarmed Targets [article]

Giuseppe De Nittis, Nicola Gatti
<span title="2018-06-19">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We focus on adversarial patrolling games on arbitrary graphs, where the Defender can control a mobile resource, the targets are alarmed by an alarm system, and the Attacker can observe the actions of the  ...  This scenario can be modeled as a zero-sum extensive-form game in which each player can play multiple times.  ...  An alarm system generates a signal whenever a target is under attack. A 2-player security game is played by an Attacker A and a Defender D.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.07111v1">arXiv:1806.07111v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3jubszc4czcwdgctrooatzekyu">fatcat:3jubszc4czcwdgctrooatzekyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191020192508/https://arxiv.org/pdf/1806.07111v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/b2/05b2cf5eeac61ad020f1e28fbd3800db65ae0702.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.07111v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

6. Applying game theory for adversarial risk analysis in chemical plants [chapter]

Laobing Zhang, Genserik Reniers, Genserik Reniers, Nima Khakzad, Pieter Van Gelder
<span title="2017-11-20">2017</span> <i title="De Gruyter"> Security Risk Assessment </i> &nbsp;
With regard to security, causing a domino effect accident can be the motivation for an attack on a chemical plant/cluster.  ...  Game theory was developed in the economic domain for modelling both cooperative and competitive behaviours in a multiple actors system.  ...  In conclusion, the chemical plant protection game is a two-player game played by a defender and an attacker, and the types of attacker can be various.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/9783110499087-006">doi:10.1515/9783110499087-006</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jya2tie5afgkhjde2q2o2ja4v4">fatcat:jya2tie5afgkhjde2q2o2ja4v4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200216011813/https://repository.tudelft.nl/islandora/object/uuid%3Aeec6ef3b-3d9d-4b7d-8d9b-02fa5a4d9245/datastream/OBJ/download" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/84/bd/84bd39c6cfa6fe37c2e014074d4e360c24b6d795.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/9783110499087-006"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> degruyter.com </button> </a>

A Survey of Interdependent Information Security Games

Aron Laszka, Mark Felegyhazi, Levente Buttyan
<span title="2014-08-29">2014</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions.  ...  We focus our attention on games with interdependent defenders and do not discuss two-player attackerdefender games.  ...  For example, the interaction between one attacker and one defender can be modeled as a classic two-player game. 1 Yet, simple two-player games neglect an important aspect of strategic interaction: there  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2635673">doi:10.1145/2635673</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jrparifc4fb7vpctofga43ytau">fatcat:jrparifc4fb7vpctofga43ytau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171026050324/https://core.ac.uk/download/pdf/24065195.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/fd/12fd7ed607d660969e7b78d73f398463a5c03f2c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2635673"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Defending Against Advanced Persistent Threats Using Game-Theory

Stefan Rass, Sandra König, Stefan Schauer, Cheng-Yi Xia
<span title="2017-01-03">2017</span> <i title="Public Library of Science (PLoS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s3gm7274mfe6fcs7e3jterqlri" style="color: black;">PLoS ONE</a> </i> &nbsp;
Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an APT defense  ...  The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives  ...  Acknowledgments We thank the anonymous reviewers and the editorial board for valuable suggestions that helped to improve the clarity and content of this article, and also for drawing our attention to interesting  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1371/journal.pone.0168675">doi:10.1371/journal.pone.0168675</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/28045922">pmid:28045922</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5207710/">pmcid:PMC5207710</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4mljgzdfxvcutjt3nwc46ek6oy">fatcat:4mljgzdfxvcutjt3nwc46ek6oy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171012055712/http://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0168675&amp;type=printable" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9f/12/9f1237d4299aba73ae3175c6abe81b0d6b13902a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1371/journal.pone.0168675"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> plos.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5207710" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis

Jeffrey Acquaviva, Mark Mahon, Bruce Einfalt, Tom LaPorta
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vb3ehoarofgm5p24f2dqjxmp3a" style="color: black;">2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)</a> </i> &nbsp;
This thesis introduces a novel model of Advanced Persistent Threats in a network, and uses game theory to compute the optimal defense strategies to counter these attacks.  ...  It is shown that defense-in-depth may not be optimal when the defender is budget constrained. Lastly, two use-cases are presented to demonstrate how this model can be used in real-world scenarios. iii  ...  In co-operative games, these agents work together and payoffs can be shared between all participants. However, most security games examine two adversarial agents: an attacker and a defender.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/srds.2017.29">doi:10.1109/srds.2017.29</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/srds/AcquavivaMEL17.html">dblp:conf/srds/AcquavivaMEL17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ilumoiahcfhonbpr2ckrpkiwwi">fatcat:ilumoiahcfhonbpr2ckrpkiwwi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321125225/https://etda.libraries.psu.edu/files/final_submissions/14071" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2d/54/2d54b46a1a9acce62ccb2fd81cdccc6a68810344.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/srds.2017.29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
<span title="2021-10-29">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  analysis of the techniques, and evaluation methods.  ...  MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.15747v1">arXiv:2110.15747v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zboddcg4a5gdxmq5hqmo5cpj34">fatcat:zboddcg4a5gdxmq5hqmo5cpj34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211103171523/https://arxiv.org/pdf/2110.15747v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0b/e3/0be3c527d4a55c6d27dc1b31d7fe511eaa9213ea.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.15747v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Modeling and Analysis of Leaky Deception using Signaling Games with Evidence [article]

Jeffrey Pawlick, Edward Colbert, Quanyan Zhu
<span title="2018-04-18">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we extend signaling games by including a detector that gives off probabilistic warnings when the sender acts deceptively.  ...  Our results provide a quantitative and rigorous analysis of the fundamental aspects of detectable deception.  ...  Hypothesis testing evaluates the truthfulness of claims based on probabilistic evidence [15] . Inspection games embed a hypothesis testing problem inside of a two-player game [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1804.06831v1">arXiv:1804.06831v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wva4imua6ncdbogyqlmqr7lfsq">fatcat:wva4imua6ncdbogyqlmqr7lfsq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200825010113/https://arxiv.org/pdf/1804.06831v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/bc/7bbca6e3c3063a71157118d2743e63dbfd4adaad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1804.06831v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
<span title="2022-04-22">2022</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  of the techniques, and evaluation methods.  ...  MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3530809">doi:10.1145/3530809</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cwk5bp56ere5re2frzgzox56ka">fatcat:cwk5bp56ere5re2frzgzox56ka</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220503020912/https://dl.acm.org/doi/pdf/10.1145/3530809" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/fe/01fe9059059757c4927430e17afd3cdafe20a282.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3530809"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 470 results