2020
DOI: 10.1007/978-3-030-64793-3_24
|View full text |Cite
|
Sign up to set email alerts
|

Game Theory on Attack Graph for Cyber Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…Various honeypot allocation methods for deception over attack graphs have been studied based on game theoretic approaches that considers uncertainty using partially observable MDP (POMDP) and stochastic games (POSG) [14,78]. Anwar et al [15] developed a static game model to protect a connected graph of targeted nodes against an attacker through honeypot placements based on node features and significance.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
See 4 more Smart Citations
“…Various honeypot allocation methods for deception over attack graphs have been studied based on game theoretic approaches that considers uncertainty using partially observable MDP (POMDP) and stochastic games (POSG) [14,78]. Anwar et al [15] developed a static game model to protect a connected graph of targeted nodes against an attacker through honeypot placements based on node features and significance.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
“…• Node or device compromise [2,3,12,13,14,15,23,24,30,58,63,65,73,81,87,99,100,104,106,111,135,141]: Some research does not specify the details of attack process. The authors only use "device compromising" to represent an attack.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
See 3 more Smart Citations