“…Kulkarni et al [85], Milani et al [96], Tsemogne et al [133] investigated game-theoretic cyberdeception techniques played on attack graphs. Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game. Milani et al [96] developed a Stackelberg game to allocated defensive resources and manipulate a generated attack graph.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
“…• Node or device compromise [2,3,12,13,14,15,23,24,30,58,63,65,73,81,87,99,100,104,106,111,135,141]: Some research does not specify the details of attack process. The authors only use "device compromising" to represent an attack.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
“…The authors only use "device compromising" to represent an attack. Some research discusses that an attacker can probe a target before attacking [2,3,12,13,14,15,63,65,81,87,99,100,111,135,141] while others only discuss the attacking actions [23,24,30,58,73,104,106].…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
“…A signaling game is also considered with a perfect Bayesian equilibrium to model the interactions between an attacker and defender [40]. IoTs in battlefields is referred to IoBTs where deception games introduced in [14,15,13,12,23,99,141] 4) Pros and Cons: Since honeypots are fake nodes mimicking the behavior of a regular node, adding a honeypot won't change the hierarchy of the IoT network or the interface of IoT gateways. A game-theoretic honeypot technique is the only technique applied to this domain.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…• Detection accuracy [1,21,24,23,27,32,45,60,88 [45] used an algorithm to discover fake Liker in social networks. The authors in [27,32,143] evaluated a masquerade attack detector based on AUC.…”
Defensive deception is a promising approach for cyberdefense. Although defensive deception is increasingly popular in the research community, there hasn't been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various problem settings. This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed in defensive deception. This paper brings forth insights, lessons, and limitations from prior work. It closes with an outline of some research directions to tackle major gaps in current defensive deception research.
“…Kulkarni et al [85], Milani et al [96], Tsemogne et al [133] investigated game-theoretic cyberdeception techniques played on attack graphs. Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game. Milani et al [96] developed a Stackelberg game to allocated defensive resources and manipulate a generated attack graph.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
“…• Node or device compromise [2,3,12,13,14,15,23,24,30,58,63,65,73,81,87,99,100,104,106,111,135,141]: Some research does not specify the details of attack process. The authors only use "device compromising" to represent an attack.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
“…The authors only use "device compromising" to represent an attack. Some research discusses that an attacker can probe a target before attacking [2,3,12,13,14,15,63,65,81,87,99,100,111,135,141] while others only discuss the attacking actions [23,24,30,58,73,104,106].…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
“…A signaling game is also considered with a perfect Bayesian equilibrium to model the interactions between an attacker and defender [40]. IoTs in battlefields is referred to IoBTs where deception games introduced in [14,15,13,12,23,99,141] 4) Pros and Cons: Since honeypots are fake nodes mimicking the behavior of a regular node, adding a honeypot won't change the hierarchy of the IoT network or the interface of IoT gateways. A game-theoretic honeypot technique is the only technique applied to this domain.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…• Detection accuracy [1,21,24,23,27,32,45,60,88 [45] used an algorithm to discover fake Liker in social networks. The authors in [27,32,143] evaluated a masquerade attack detector based on AUC.…”
Defensive deception is a promising approach for cyberdefense. Although defensive deception is increasingly popular in the research community, there hasn't been a systematic investigation of its key components, the underlying principles, and its tradeoffs in various problem settings. This survey paper focuses on defensive deception research centered on game theory and machine learning, since these are prominent families of artificial intelligence approaches that are widely employed in defensive deception. This paper brings forth insights, lessons, and limitations from prior work. It closes with an outline of some research directions to tackle major gaps in current defensive deception research.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.