2018
DOI: 10.1177/1548512918795061
|View full text |Cite
|
Sign up to set email alerts
|

The game-theoretic model and experimental investigation of cyber wargaming

Abstract: We demonstrate that game-theoretic calculations serve as a useful tool for assisting cyber wargaming teams in identifying useful strategies. We note a significant similarity between formulating cyber wargaming strategies and the methodology known in military practice as Course of Action (COA) generation. For scenarios in which the attacker must penetrate multiple layers in a defense-in-depth security configuration, an accounting of attacker and defender costs and penetration probabilities provides cost-utility… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Moderate-sized agribusinesses, including many food processing companies and supporting industries, are vulnerable since cyber-attacks are often targeted against organizations with <100 employees (Geil et al, 2018). The Fd+Ag system includes military food production, such as the manufacturing of packaged meals for soldiers, which has a high potential for sabotage (Colbert et al, 2018). It is important to note that attackers need not know details of the food manufacturing process.…”
Section: Vulnerability Of the Food And Agricultural System And The Bimentioning
confidence: 99%
“…Moderate-sized agribusinesses, including many food processing companies and supporting industries, are vulnerable since cyber-attacks are often targeted against organizations with <100 employees (Geil et al, 2018). The Fd+Ag system includes military food production, such as the manufacturing of packaged meals for soldiers, which has a high potential for sabotage (Colbert et al, 2018). It is important to note that attackers need not know details of the food manufacturing process.…”
Section: Vulnerability Of the Food And Agricultural System And The Bimentioning
confidence: 99%
“…Hence, game-theoretical approaches such as wargaming may fit the behavior of autonomous cyber-defenders and attackers. One example is offered in [11], which provides a formulation of the wargame that includes attacker and defender benefits, the probabilities of the attacker breaching defense layers, strategies, costs and utility for attacker and defender.…”
Section: Wargamingmentioning
confidence: 99%
“…Hence, the computation of optimal defense strategies may be impractical, leading to sub-optimal solutions. Moreover, cyber wargaming, as proposed in [11], requires that experts estimate payoffs and probabilities. Obtaining expert estimates may be a difficult and expensive process that can result in subjective, inconsistent, and/or unreliable results as discussed in Section 2.2.…”
Section: Wargamingmentioning
confidence: 99%
See 1 more Smart Citation
“…In this way, the system designer should protect the processes of absorption and recovery after a threat so that these processes are less penalized by malicious actions. The work in [155] [156][144] propose GT to identify effective strategies against cyber-threats.…”
Section: Analyzing System Menacesmentioning
confidence: 99%