2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing 2015
DOI: 10.1109/cscloud.2015.80
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach

Abstract: Cybersecurity is among the highest priorities in industries, academia and governments. Cyber-threats information sharing among different organizations has the potential to maximize vulnerabilities discovery at a minimum cost. Cyberthreats information sharing has several advantages. First, it diminishes the chance that an attacker exploits the same vulnerability to launch multiple attacks in different organizations. Second, it reduces the likelihood an attacker can compromise an organization and collect data th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 14 publications
(21 reference statements)
0
7
0
Order By: Relevance
“…The use of game theory has largely focused on the VM allocation problem in the presence of adversaries [13], [14], [40], [15], [41]. A common assumption in such formulations is that the adversary is known which does not typically hold in practice.…”
Section: B Cloud Security Using Game-theoretic Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of game theory has largely focused on the VM allocation problem in the presence of adversaries [13], [14], [40], [15], [41]. A common assumption in such formulations is that the adversary is known which does not typically hold in practice.…”
Section: B Cloud Security Using Game-theoretic Techniquesmentioning
confidence: 99%
“…• Unlike [13], [14], [15], we do not assume the defender has prior knowledge of the exact location of the attacker, thereby allowing for realistic threat and defense models. The defender has to migrate the VMs at the right time(s) to defend against malicious collocating users.…”
Section: Introductionmentioning
confidence: 99%
“…This was one of the first frameworks to share information about security vulnerabilities. The research in [30] presented a game theoretic model for CTI sharing in the cloud. The model focused on trade-offs between the security and risks of sharing CTI.…”
Section: Cti Sharing Collaborationmentioning
confidence: 99%
“…The 4 previously presented works contributing to CTI collaboration from various perspectives. Where [29], [30], and [31] are applicable to generic CTI collaboration; [32] focuses on specific CTI sharing collaboration pertaining to environmental needs, i.e., country specific.…”
Section: Cti Sharing Collaborationmentioning
confidence: 99%
“…In these settings, sector‐specific views together with experiences and extended case descriptions need to be exchanged to derive complete benefits . Cyberincident IS has the potential for improving vulnerabilities discovery with reduced costs . It facilitates keeping up with the evolving threat landscape, enhances threat awareness, and enables effective incident response .…”
Section: Introductionmentioning
confidence: 99%