Game Theory and Machine Learning for Cyber Security 2021
DOI: 10.1002/9781119723950.ch3
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Kulkarni et al [85], Milani et al [96], Tsemogne et al [133] investigated game-theoretic cyberdeception techniques played on attack graphs. Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game. Milani et al [96] developed a Stackelberg game to allocated defensive resources and manipulate a generated attack graph.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
See 4 more Smart Citations
“…Kulkarni et al [85], Milani et al [96], Tsemogne et al [133] investigated game-theoretic cyberdeception techniques played on attack graphs. Kulkarni et al [85], Basak et al [23] formulated a deception game to place decoy devices to deceive and trap an attacker and proposed a greedy algorithm to solve the developed game. Milani et al [96] developed a Stackelberg game to allocated defensive resources and manipulate a generated attack graph.…”
Section: B Game-theoretic Defensive Deceptionmentioning
confidence: 99%
“…• Node or device compromise [2,3,12,13,14,15,23,24,30,58,63,65,73,81,87,99,100,104,106,111,135,141]: Some research does not specify the details of attack process. The authors only use "device compromising" to represent an attack.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
See 3 more Smart Citations