Adaptive Autonomous Secure Cyber Systems 2020
DOI: 10.1007/978-3-030-33432-1_9
|View full text |Cite
|
Sign up to set email alerts
|

Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 19 publications
0
19
0
1
Order By: Relevance
“…2. For this 20-node network, the defender has 10 actions for honeypot allocations including (6,12), (5,11), (16,19), (11,15), (0,5), (16,20), (12,16), (0,6), Fig. 2: Network topology consists of 20 nodes, with entry nodes represented in blue, target nodes in red, and intermediate nodes in yellow.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…2. For this 20-node network, the defender has 10 actions for honeypot allocations including (6,12), (5,11), (16,19), (11,15), (0,5), (16,20), (12,16), (0,6), Fig. 2: Network topology consists of 20 nodes, with entry nodes represented in blue, target nodes in red, and intermediate nodes in yellow.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Game theoretic defensive deception [13] has been widely discussed in cybersecurity research. Authors in [14] presented a deception game for a defender who chooses a deception in response to the attacker's observation, while the attacker is unaware or aware of the deception. Authors in [15,5] proposed a signaling game based model to develop a honeypot defense system against DoS attacks.…”
Section: Cyber Deception Gtmentioning
confidence: 99%
See 1 more Smart Citation
“…e term discount expresses the assumption that a person does not value current and future returns equally. Parameter δ is the discount rate of an individual [18]. e closer δ is to 0, the less the individual values a future versus a present performance.…”
Section: Proposed Game Strategymentioning
confidence: 99%
“…Hidden information has been allowed on the part of the defender or the attacker in security games (Yin and Tambe, 2012; Xu et al., 2015, 2016; Schlenker et al., 2018; Gan et al., 2019). In this paper, we incorporate hidden information in the terror response facility location problem under disruption risk, to explain explicitly the effects of the defender's secret strategies against the adaptive adversary on the optimal solution compared to the fully disclosed case.…”
Section: Introductionmentioning
confidence: 99%