2019
DOI: 10.1007/978-3-030-32430-8_31
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Camouflage Games for Strategic Deception

Abstract: The rapid increase in cybercrime, causing a reported annual economic loss of $600 billion (Lewis 2018), has prompted a critical need for effective cyber defense. Strategic criminals conduct network reconnaissance prior to executing attacks to avoid detection and establish situational awareness via scanning and fingerprinting tools. Cyber deception attempts to foil these reconnaissance efforts by camouflaging network and system attributes to disguise valuable information. Game-theoretic models can identify deci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Thakoor et al [132] introduced a general-sum game, named Cyber Camouflage Games (CCGs), to model the interactions between a defender and an attacker performing reconnaissance attacks. The defender can mask the machine in the network with fake information, such as an operating system, to mitigate the effect of reconnaissance attacks.…”
Section: Pros and Consmentioning
confidence: 99%
See 2 more Smart Citations
“…Thakoor et al [132] introduced a general-sum game, named Cyber Camouflage Games (CCGs), to model the interactions between a defender and an attacker performing reconnaissance attacks. The defender can mask the machine in the network with fake information, such as an operating system, to mitigate the effect of reconnaissance attacks.…”
Section: Pros and Consmentioning
confidence: 99%
“…• Utility [14,15,13,12,37,49,65,73,75,81,96,97,99,101,100,106,107,111,114,122,132,133,137,141,153,155]:…”
Section: A Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Among the rich literature of Stackelberg security games (SSGs) (Tambe 2011;Bucarey et al 2017), SSGs with realtime information have been studied recently. Some recent work in deception for cybersecurity, such as (Cooney et al 2019;Thakoor et al 2019), considers strategic signaling with boundedly rational attackers and attackers with different objectives and abilities, but no sensing is required to identify attackers; rather, the systems may interact with both normal and adversarial users. Some other work relies on human patrollers for real-time information (Zhang et al 2019;Wang et al 2019), and others rely on sensors that can notify the patroller when an opponent is detected (de Cote et al 2013;Basilico, De Nittis, and Gatti 2015;De Nittis and Gatti 2018).…”
Section: Related Workmentioning
confidence: 99%
“…Security games [24,15] are another class of important models for resource allocation in adversarial environments. In [25], the authors formulate a security game (Stackelberg game) to allocate limited decoy resources in a cybernetwork to mask network configurations from the attacker. This class of deception manipulates the adversary's perception of the payoffs and thus causes the adversary to take (or not to take) certain actions that aid the objective of the defender.…”
Section: Introductionmentioning
confidence: 99%