2019
DOI: 10.1007/978-3-030-32430-8_5
|View full text |Cite
|
Sign up to set email alerts
|

You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…A likely perpetrator will commit a crime if the inequality presented in Figure 1 holds [22,23]. Game theory has been proposed as a mechanism to increase the negative returns and to decrease the positive returns to the perpetrator considering an illegal cybersecurity attack [24,25].…”
Section: Research On the Economics Of Crimementioning
confidence: 99%
“…A likely perpetrator will commit a crime if the inequality presented in Figure 1 holds [22,23]. Game theory has been proposed as a mechanism to increase the negative returns and to decrease the positive returns to the perpetrator considering an illegal cybersecurity attack [24,25].…”
Section: Research On the Economics Of Crimementioning
confidence: 99%
“…First, among studies on game theory with MDP and POMDP, Bilinski et al [49] have described solutions based on masking games and Stackelberg games that can hide the essence of the defender node through processes such as inquiries between attackers and defenders, payment of costs, and selection of the final compromise target. These solutions make it possible to probabilistically analyze the attacker's potential behaviors before and after the exploit.…”
Section: Game-theoretic Defensive Deception With Non-mtdmentioning
confidence: 99%
“…Bilinski et al [30] introduced game-theoretic deception procedures based on a masking game in which a defender masks the true nature of a device. In this game, an attacker can ask the defender whether a given device is real or fake at each round of the game.…”
Section: Pros and Consmentioning
confidence: 99%
“…• Dataset Collection: The success of ML techniques hugely depends on whether reliable datasets are available or not. Node compromise [30,73]; APT [75]; Reconnaissance [45] Enterprise networks; SDNs…”
Section: A Key Steps Of Implementing Ml-based Defensive Deceptionmentioning
confidence: 99%