2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications 2013
DOI: 10.1109/mobilware.2013.27
|View full text |Cite
|
Sign up to set email alerts
|

Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies

Abstract: nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…A cyber warfare interaction scenario is formulated as a game where the players (cyber attackers and network defenders) are assumed to possess imperfect information about their opponents. With the uncertainty about the current status of the environment, the players have to strategically plan their actions to gain a positive payoff [16][17][18][19] . These attackdefence scenarios are modelled and exercised on a virtual cyber test-bed using modelling and simulation techniques to assess and evaluate the vulnerabilities in cyber systems, suggest various course of actions and support decisions of appropriate actions to be taken by the players.…”
Section: Introductionmentioning
confidence: 99%
“…A cyber warfare interaction scenario is formulated as a game where the players (cyber attackers and network defenders) are assumed to possess imperfect information about their opponents. With the uncertainty about the current status of the environment, the players have to strategically plan their actions to gain a positive payoff [16][17][18][19] . These attackdefence scenarios are modelled and exercised on a virtual cyber test-bed using modelling and simulation techniques to assess and evaluate the vulnerabilities in cyber systems, suggest various course of actions and support decisions of appropriate actions to be taken by the players.…”
Section: Introductionmentioning
confidence: 99%