2016
DOI: 10.1007/978-3-319-47413-7_12
|View full text |Cite
|
Sign up to set email alerts
|

FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 21 publications
1
18
0
Order By: Relevance
“…Xu et al [31] present zero-sum security games where the attacker acquires partial knowledge on the security resources the defender is protecting, and show the defender's optimal strategy under such attacker's knowledge. More recently, Farhang et al [12] present two-player games where utilities are defined taking account of information leakage, although the defender's goal is different from our setting. They consider a model where the attacker incrementally and stealthily obtains partial information on a secret, while the defender periodically changes the secret after some time to prevent a complete compromise of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Xu et al [31] present zero-sum security games where the attacker acquires partial knowledge on the security resources the defender is protecting, and show the defender's optimal strategy under such attacker's knowledge. More recently, Farhang et al [12] present two-player games where utilities are defined taking account of information leakage, although the defender's goal is different from our setting. They consider a model where the attacker incrementally and stealthily obtains partial information on a secret, while the defender periodically changes the secret after some time to prevent a complete compromise of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, the leakage loss term dominates the defender's payoff function u d at this small migration cost. Indeed, referring to (12), u d is monotonically decreasing in τ d when C d → 0. On the other hand, when the migration cost is high as shown in Fig.…”
Section: B Cost Effect and Monotonicitymentioning
confidence: 99%
“…Similarly, we model the defender's utility as the negation of the amount of time the attacker remains in the system multiplied by δ i ∈ [1,10], a coefficient describing how disruptive the attacker type i is. Coefficients δ i model the fact that different attackers may also be more or less disruptive to the defender.…”
Section: Utilitiesmentioning
confidence: 99%