2020
DOI: 10.1007/978-3-030-64793-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Harnessing the Power of Deception in Attack Graph-Based Security Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…Durkota et al [58] leveraged a Stackelberg game where an attacker follows an attack graph and a defender can deploy a honeypot to deceive the attacker based on an efficient optimal strategy searching method using Markov Decision Processing (MDP) and sibling-class pruning. Kulkarni et al [85], Milani et al [96], Tsemogne et al [133] investigated game-theoretic cyberdeception techniques played on attack graphs. Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
See 4 more Smart Citations
“…Durkota et al [58] leveraged a Stackelberg game where an attacker follows an attack graph and a defender can deploy a honeypot to deceive the attacker based on an efficient optimal strategy searching method using Markov Decision Processing (MDP) and sibling-class pruning. Kulkarni et al [85], Milani et al [96], Tsemogne et al [133] investigated game-theoretic cyberdeception techniques played on attack graphs. Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
“…Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game. Milani et al [96] developed a Stackelberg game to allocated defensive resources and manipulate a generated attack graph. Tsemogne et al [133] studied the malicious behavior through an epidemic model and solved a one-sided partially observable stochastic game for cyberdeception where a defender distributes a limited number of honeypots.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
See 3 more Smart Citations