2019
DOI: 10.1007/978-3-030-32430-8_2
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…They used signaling games with perfect Bayesian equilibrium to model the interactions between the defender and attacker. Basak et al [24] used cyberdeception tools to identify an attacker type as early as possible to take better defensive strategies. The attacker type is encapsulated in his actions and goals when planning an attack campaign.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
See 4 more Smart Citations
“…They used signaling games with perfect Bayesian equilibrium to model the interactions between the defender and attacker. Basak et al [24] used cyberdeception tools to identify an attacker type as early as possible to take better defensive strategies. The attacker type is encapsulated in his actions and goals when planning an attack campaign.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
“…• Node or device compromise [2,3,12,13,14,15,23,24,30,58,63,65,73,81,87,99,100,104,106,111,135,141]: Some research does not specify the details of attack process. The authors only use "device compromising" to represent an attack.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
See 3 more Smart Citations