2013
DOI: 10.1007/978-3-642-39218-4_26
|View full text |Cite
|
Sign up to set email alerts
|

ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy

Abstract: Game theory has been researched extensively in network security demonstrating an advantage of modeling the interactions between attackers and defenders. Game theoretic defense solutions have continuously evolved in most recent years. One of the pressing issues in composing a game theoretic defense system is the development of consistent quantifiable metrics to select the best game theoretic defense model. We survey existing game theoretic defense, information assurance, and risk assessment frameworks that prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…Using attack components, a set of metrics are defined and used by an attack defense performance taxonomy (ADAPT system [8]). This system is game model-based.…”
Section: Detection and Response Solutionsmentioning
confidence: 99%
“…Using attack components, a set of metrics are defined and used by an attack defense performance taxonomy (ADAPT system [8]). This system is game model-based.…”
Section: Detection and Response Solutionsmentioning
confidence: 99%
“…Then these inputs and submitted 6 to the KMS appropriately by the GCU 7 . The information is analyzed and attack/attacks is/are identified using attack identification system.…”
Section: Operational Flowmentioning
confidence: 99%
“…Not only different attacks warrant for different games to be played with different appropriate game models, different scenarios with same kind of attack may need different game models with 6 The GIDA Action Agent uses the first lookup table for this. 7 A typical example for this would be when two different sensors detect slight anomalies, but individual neither large enough to warrant a standard reflex action, as per sensor/actuator policies. different considerations of rewards and transition functions.…”
Section: Game Model Repositorymentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, several mitigation approaches utilize game-theoretic techniques [27]- [30]. In general, DDoS attacks are modeled as a game between each attacker node and the defender.…”
Section: Related Workmentioning
confidence: 99%