2017
DOI: 10.1007/978-3-319-68711-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
53
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
2
1

Relationship

3
7

Authors

Journals

citations
Cited by 74 publications
(62 citation statements)
references
References 21 publications
3
53
0
Order By: Relevance
“…Another approach is based on the type of the attack and malicious behaviour [114]- [118]. More particularly, in this case, depending on the type of adversarial or malicious behavior that is active or passive, an appropriate game strategy, e.g., Nash or Stackelberg, has been discussed.…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…Another approach is based on the type of the attack and malicious behaviour [114]- [118]. More particularly, in this case, depending on the type of adversarial or malicious behavior that is active or passive, an appropriate game strategy, e.g., Nash or Stackelberg, has been discussed.…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…For the purposes of the classification in Section 4, it is interesting to note that the paper builds upon the foundation of honeypot deployment, but adds the dynamic element of multiple-round attack graphs. Horák et al [2017] model the penetration of an attacker into a network using a one-sided partially observable stochastic game. Unlike most approaches to network security, Horák et al consider the defender rather than the attacker to be the informed player.…”
Section: Attacker Engagementmentioning
confidence: 99%
“…Active defenses [14] and defensive deceptions [1] to detect and deter attacks have been active research areas. The authors in [8] design a proactive defense scheme where the defender can manipulate the adversary's belief. In particular, many works [7], [16] including ones with game-theoretic models [22], [12] focus on adaptive honeypot deployment to effectively engage attackers and gather information without attackers' notice.…”
Section: A Related Workmentioning
confidence: 99%