2021
DOI: 10.48550/arxiv.2101.10121
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

Abstract: Defensive deception is a promising approach for cyberdefense. Although defensive deception is increasingly popular in the research community, there hasn't been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various problem settings. This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed in defensive deception. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 159 publications
(462 reference statements)
0
4
0
Order By: Relevance
“…When the deception strategy is used in the defender mode, it is generally called defensive deception technology. This will prevent the attackers from [14].…”
Section: Defensive Deception Technologymentioning
confidence: 99%
“…When the deception strategy is used in the defender mode, it is generally called defensive deception technology. This will prevent the attackers from [14].…”
Section: Defensive Deception Technologymentioning
confidence: 99%
“…On the other hand, Honey-X and decoys perform reactive induction and isolation by manipulating, abusing, or misleading the attacker's cognitive aspects. Obfuscation is another separate study area, and its crucial difference is that it is closely related to the achievement of security goals at the data level [6].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, macroscopically upgrading MTD strategies to maximize defenders' gains by minimizing performance degradation and maximizing security, and to minimize attackers' gains such as lateral movement and successful capture of the target host is also a main goal. Characteristically, the previous studies can be divided into 'general game-theoretic studies', 'Bayesian Stackelberg game-theoretic studies', and 'stochastic game-theoretic studies' [6,12,13].…”
Section: Game-enabled Defensive Deception Techniques With Mtdmentioning
confidence: 99%
See 2 more Smart Citations