2020
DOI: 10.1016/j.cose.2019.101660
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems

Abstract: Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for Cyber-Physical Systems (CPSs) due to APTs' stealthy, dynamic and adaptive nature. The proactive dynamic defense provides a strategic and holistic security mechanism to increase costs of attacks and mitigate risks. This work proposes a dynamic game framework to model the long-term interaction between the stealthy attacker and the proactive defender. The stealthy and deceptive behaviors are captured by the multistage… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
53
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 110 publications
(62 citation statements)
references
References 32 publications
1
53
0
Order By: Relevance
“…We plot the feedback Bayesian learning process in Fig. 2 and elaborate each element in the following subsections based on our previous work [5].…”
Section: Bayesian Learning For Uncertain Parametersmentioning
confidence: 99%
See 2 more Smart Citations
“…We plot the feedback Bayesian learning process in Fig. 2 and elaborate each element in the following subsections based on our previous work [5].…”
Section: Bayesian Learning For Uncertain Parametersmentioning
confidence: 99%
“…Next, we update the belief at each stage based on the computed equilibrium strategy. We iterate the above update on the equilibrium strategy and belief until they satisfy condition C1 as demonstrated in [5]. If the type space is continuous, then the Bayesian update can be simplified into a parametric update under the conjugate prior assumption.…”
Section: Utility and Pbnementioning
confidence: 99%
See 1 more Smart Citation
“…(2) Attack detection methods based on physical power grid data ignore the impact of cyber network attacks on the performance of smart grids. The effects of power grid failures and cyber-attacks on the physical side are similar, and it is difficult to distinguish them based on data characteristics (Liu et al, 2016;Huang and Zhu, 2020). (3) A cyber-attack is characterized by unbalanced attack samples, high data dimensionality, and noise, and data with a long tail are common.…”
Section: Introductionmentioning
confidence: 99%
“…Another strategy is to use game-theoretic approaches such as [15] and [16]. These approaches have the advantage of providing proactive dynamic defenses.…”
Section: Introductionmentioning
confidence: 99%