2023
DOI: 10.1007/978-3-031-26369-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach

Abstract: Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "How to allocate honeypots over the network?" to protect its most valuable assets. To this end, we develop a two-play… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…We meticulously pinpoint the most detrimental links and subsequently propose a mitigating strategy. This work complements our analysis and evaluates the impact and mitigation of imperfect vulnerability information to the defender in relation to our previous work on security games with imperfect information (Sayed et al 2022).…”
Section: Introductionmentioning
confidence: 84%
See 1 more Smart Citation
“…We meticulously pinpoint the most detrimental links and subsequently propose a mitigating strategy. This work complements our analysis and evaluates the impact and mitigation of imperfect vulnerability information to the defender in relation to our previous work on security games with imperfect information (Sayed et al 2022).…”
Section: Introductionmentioning
confidence: 84%
“…Hypergame-based deception against advanced persistent threat attacks performing multiple attacks performed in the stages of cyber kill chain discussed in (Wan et al 2021). A game theoretic approach for zero-day vulnerability analysis and deceptive mitigation against zero-day vulnerability proposed by (Sayed et al 2022). The synergies between game theory and machine learning to formulate defensive deception discussed in (Zhu et al 2021).…”
Section: Game Theoretic Deceptionmentioning
confidence: 99%
“…Cyber deception is a strategy that utilizes false information and decoys in networks to mislead and divert attackers. The goal is to lure, confuse, or delay attackers while simultaneously detecting their presence and gaining insights into their tactics, allowing for early threat detection and enhanced cybersecurity defenses [11]. Furthermore, in [12], the authors addressed the critical issue of DDoS attacks on SDN IoT-Edge Computing, exacerbated by the pandemic-induced remote work trend.…”
Section: Related Workmentioning
confidence: 99%
“…This situation arises due to the widespread use of IoT, * Upon receiving a "Yes" response from the checker, indicating ample resources within the MEC server, the SDN controller forwards the request to the VNF processor (10). The VNF processor carries out the computation and transmits the response back to the SDN controller (11). The received response is then dispatched to the VNF receiver (VM3) for storage in the Cloud data center ( 8) and delivery to the legitimate device.…”
Section: B Request Process Managementmentioning
confidence: 99%