2016
DOI: 10.1609/aaai.v30i2.19082
|View full text |Cite
|
Sign up to set email alerts
|

Data Driven Game Theoretic Cyber Threat Mitigation

Abstract: Penetration testing is regarded as the gold-standard for understanding how well an organization can withstand sophisticated cyber-attacks. However, the recent prevalence of markets specializing in zero-day exploits on the darknet make exploits widely available to potential attackers. The cost associated with these sophisticated kits generally precludes penetration testers from simply obtaining such exploits – so an alternative approach is needed to understand what exploits an attacker will most likely purchase… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…The accuracy of these models were 99.3%, 98.4%, and 98.8%, respectively, and the MITRE ATT&CK matrix was used to illustrate the outcomes of the malicious le analysis. The authors of the research [12] presented a data-driven security game framework to model an attacker and give the defence policy recommendations. They provide experimental ndings from implementing their framework, for various system con gurations, to real world exploit market data actively mined from the darknet, in addition to giving a formal framework and algorithms to design tactics.…”
Section: Experimental Analysismentioning
confidence: 99%
“…The accuracy of these models were 99.3%, 98.4%, and 98.8%, respectively, and the MITRE ATT&CK matrix was used to illustrate the outcomes of the malicious le analysis. The authors of the research [12] presented a data-driven security game framework to model an attacker and give the defence policy recommendations. They provide experimental ndings from implementing their framework, for various system con gurations, to real world exploit market data actively mined from the darknet, in addition to giving a formal framework and algorithms to design tactics.…”
Section: Experimental Analysismentioning
confidence: 99%
“…This situation has drawn interest in Dark Web-related research in monitoring and extracting information for cyber-threat intelligence [57,58] (CTI) through Dark Web forum analysis [59]. The current works take into account the relationship between suppliers and users and transaction statistic discoveries [60], developing automated approaches for discovering evidence of potential threats within hacker forums to aid in cyber-threat detection [61] and data-driven security game frameworks to model attackers and provide policy recommendations to the defender [62]. The study [63,64] discussed various strategies for monitoring the hidden areas of the Internet and suggested monitoring the DarkNet to find possible dangerous threats and activities [65,66].…”
Section: Literature Reviewmentioning
confidence: 99%