![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networ...
-
Chapter and Conference Paper
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have ...
-
Chapter and Conference Paper
A Network Centrality Game for Epidemic Control
Many epidemic networks admit the partition of the population into three compartments of respective susceptible, infected, and removed individuals. These epidemics involve a conflict between the agent who is pr...
-
Chapter and Conference Paper
MAVIPER: Learning Decision Tree Policies for Interpretable Multi-agent Reinforcement Learning
Many recent breakthroughs in multi-agent reinforcement learning (MARL) require the use of deep neural networks, which are challenging for human experts to interpret and understand. On the other hand, existing ...
-
Chapter and Conference Paper
Asymmetric Centrality Game Against Network Epidemic Propagation
The Mirai botnet network epidemic discovered in 2016 falls into the category of numerous epidemics propagated by attackers over a network to gain control over multiple devices. This particular epidemic has bee...
-
Chapter and Conference Paper
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs
This paper investigates the problem of synthesizing proactive defense systems with deception. We model the interaction between the attacker and the system using a formal security model: a probabilistic attack ...
-
Chapter and Conference Paper
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks
Software-Defined Networking (SDN) is an evolving network paradigm that separates the control and forwarding functions of network devices. Its application in tactical networks can help to automate Virtual Priva...
-
Chapter and Conference Paper
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game
Intrusion Detection Systems (IDS) are security tools that aim to detect tentative of virus propagation between two interconnected devices. As the propagation of a virus or malware is dynamic and can be strateg...
-
Chapter and Conference Paper
Lightweight On-Demand Honeypot Deployment for Cyber Deception
Honeypots that are capable of deceiving attackers are an effective tool because they not only help protect networks and devices, but also because they collect information that can lead to the understanding of ...
-
Chapter and Conference Paper
Learning Generative Deception Strategies in Combinatorial Masking Games
Deception is a crucial tool in the cyberdefence repertoire, enabling defenders to leverage their informational advantage to reduce the likelihood of successful attacks. One way deception can be employed is thr...
-
Chapter and Conference Paper
Game Theory on Attack Graph for Cyber Deception
Game Theory provides a set of tools and a framework suitable to study security problems. In this paper, a class of games is developed to study cyber deception and the interactions between the network defender ...
-
Chapter and Conference Paper
Blocking Adversarial Influence in Social Networks
While social networks are widely used as a media for information diffusion, attackers can also strategically employ analytical tools, such as influence maximization, to maximize the spread of adversarial conte...
-
Chapter and Conference Paper
A Game Theoretic Framework for Software Diversity for Network Security
Diversity plays a significant role in network security, and we propose a formal model to investigate and optimize the advantages of software diversity in network security. However, diversity is also costly, an...
-
Chapter and Conference Paper
Learning and Planning in the Feature Deception Problem
Today’s high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender’s loss by misleading the attacker to make suboptimal ...
-
Chapter and Conference Paper
Harnessing the Power of Deception in Attack Graph-Based Security Games
We study the use of deception in attack graph-based Stackelberg security games. In our setting, in addition to allocating defensive resources to protect important targets from attackers, the defender can strat...
-
Chapter and Conference Paper
Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic
A Decentralized Denial of Service is an attack done by an agent capable to control the spread of a malware. This is a combination of epidemiological and conflictual aspects between several decision makers. The...
-
Chapter and Conference Paper
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception
A great deal of effort is devoted to detecting the presence of cyber attacks, so that defenders can respond to protect the network and mitigate the damage of the attack. Going beyond detection, identifying in ...
-
Chapter and Conference Paper
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework
Cyber deception is an approach where the network administrators can deploy a network of decoy assets with the aim to expend adversaries’ resources and time and gather information about the adversaries’ strate...
-
Chapter and Conference Paper
An Initial Study of Targeted Personality Models in the FlipIt Game
Game theory typically assumes rational behavior for solution concepts such as Nash equilibrium. However, this assumption is often violated when human agents are interacting in real-world scenarios, such as cyb...
-
Chapter
Methods to Detect Cyberthreats on Twitter
Twitter is a microblogging service where users can post short messages and communicate with millions of users instantaneously. Twitter has been used for marketing, political campaigns, and during catastrophic ...