Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

    Nowadays, the growth of internet users has led to a significant increase in identity fraud security risks. One of the common forms of identity fraud is the Address Resolution Protocol (ARP) spoofing attack. Th...

    Fabrice Mvah, Vianney Kengne Tchendji in International Journal of Information Secur… (2024)

  2. No Access

    Chapter and Conference Paper

    Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

    Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networ...

    Md Abu Sayed, Ahmed H. Anwar in Decision and Game Theory for Security (2023)

  3. No Access

    Chapter and Conference Paper

    Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach

    Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have ...

    Md Abu Sayed, Ahmed H. Anwar in Decision and Game Theory for Security (2023)

  4. No Access

    Chapter and Conference Paper

    A Network Centrality Game for Epidemic Control

    Many epidemic networks admit the partition of the population into three compartments of respective susceptible, infected, and removed individuals. These epidemics involve a conflict between the agent who is pr...

    Olivier Tsemogne, Willie Kouam, Ahmed H. Anwar in Decision and Game Theory for Security (2023)

  5. No Access

    Chapter and Conference Paper

    MAVIPER: Learning Decision Tree Policies for Interpretable Multi-agent Reinforcement Learning

    Many recent breakthroughs in multi-agent reinforcement learning (MARL) require the use of deep neural networks, which are challenging for human experts to interpret and understand. On the other hand, existing ...

    Stephanie Milani, Zhicheng Zhang in Machine Learning and Knowledge Discovery i… (2023)

  6. No Access

    Chapter and Conference Paper

    Asymmetric Centrality Game Against Network Epidemic Propagation

    The Mirai botnet network epidemic discovered in 2016 falls into the category of numerous epidemics propagated by attackers over a network to gain control over multiple devices. This particular epidemic has bee...

    Willie Kouam, Yezekael Hayel, Gabriel Deugoué in Decision and Game Theory for Security (2023)

  7. No Access

    Chapter and Conference Paper

    Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs

    This paper investigates the problem of synthesizing proactive defense systems with deception. We model the interaction between the attacker and the system using a formal security model: a probabilistic attack ...

    Haoxiang Ma, Shuo Han, Charles Kamhoua, Jie Fu in Decision and Game Theory for Security (2023)

  8. No Access

    Chapter and Conference Paper

    FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks

    Software-Defined Networking (SDN) is an evolving network paradigm that separates the control and forwarding functions of network devices. Its application in tactical networks can help to automate Virtual Priva...

    Fabrice Mvah, Vianney Kengne Tchendji in Decision and Game Theory for Security (2023)

  9. No Access

    Chapter and Conference Paper

    Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game

    Intrusion Detection Systems (IDS) are security tools that aim to detect tentative of virus propagation between two interconnected devices. As the propagation of a virus or malware is dynamic and can be strateg...

    Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua in Decision and Game Theory for Security (2023)

  10. No Access

    Article

    A Partially Observable Stochastic Zero-sum Game for a Network Epidemic Control Problem

    The mathematical theory of epidemics borrows its fundamental notions from epidemiology. These notions encompass the division of the population of individuals into compartments and thereafter the classification...

    Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua in Dynamic Games and Applications (2022)

  11. No Access

    Chapter and Conference Paper

    Lightweight On-Demand Honeypot Deployment for Cyber Deception

    Honeypots that are capable of deceiving attackers are an effective tool because they not only help protect networks and devices, but also because they collect information that can lead to the understanding of ...

    Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld in Digital Forensics and Cyber Crime (2022)

  12. No Access

    Chapter and Conference Paper

    Learning Generative Deception Strategies in Combinatorial Masking Games

    Deception is a crucial tool in the cyberdefence repertoire, enabling defenders to leverage their informational advantage to reduce the likelihood of successful attacks. One way deception can be employed is thr...

    Junlin Wu, Charles Kamhoua, Murat Kantarcioglu in Decision and Game Theory for Security (2021)

  13. No Access

    Chapter and Conference Paper

    Game Theory on Attack Graph for Cyber Deception

    Game Theory provides a set of tools and a framework suitable to study security problems. In this paper, a class of games is developed to study cyber deception and the interactions between the network defender ...

    Ahmed H. Anwar, Charles Kamhoua in Decision and Game Theory for Security (2020)

  14. No Access

    Chapter and Conference Paper

    Blocking Adversarial Influence in Social Networks

    While social networks are widely used as a media for information diffusion, attackers can also strategically employ analytical tools, such as influence maximization, to maximize the spread of adversarial conte...

    Feiran Jia, Kai Zhou, Charles Kamhoua in Decision and Game Theory for Security (2020)

  15. No Access

    Chapter and Conference Paper

    A Game Theoretic Framework for Software Diversity for Network Security

    Diversity plays a significant role in network security, and we propose a formal model to investigate and optimize the advantages of software diversity in network security. However, diversity is also costly, an...

    Ahmed H. Anwar, Nandi O. Leslie, Charles Kamhoua in Decision and Game Theory for Security (2020)

  16. No Access

    Chapter and Conference Paper

    Learning and Planning in the Feature Deception Problem

    Today’s high-stakes adversarial interactions feature attackers who constantly breach the ever-improving security measures. Deception mitigates the defender’s loss by misleading the attacker to make suboptimal ...

    Zheyuan Ryan Shi, Ariel D. Procaccia in Decision and Game Theory for Security (2020)

  17. No Access

    Chapter and Conference Paper

    Harnessing the Power of Deception in Attack Graph-Based Security Games

    We study the use of deception in attack graph-based Stackelberg security games. In our setting, in addition to allocating defensive resources to protect important targets from attackers, the defender can strat...

    Stephanie Milani, Weiran Shen, Kevin S. Chan in Decision and Game Theory for Security (2020)

  18. No Access

    Chapter and Conference Paper

    Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic

    A Decentralized Denial of Service is an attack done by an agent capable to control the spread of a malware. This is a combination of epidemiological and conflictual aspects between several decision makers. The...

    Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua in Decision and Game Theory for Security (2020)

  19. Article

    Open Access

    Transfer learning for detecting unknown network attacks

    Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the networ...

    Juan Zhao, Sachin Shetty, Jan Wei Pan in EURASIP Journal on Information Security (2019)

  20. No Access

    Chapter and Conference Paper

    Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception

    A great deal of effort is devoted to detecting the presence of cyber attacks, so that defenders can respond to protect the network and mitigate the damage of the attack. Going beyond detection, identifying in ...

    Anjon Basak, Charles Kamhoua, Sridhar Venkatesan in Decision and Game Theory for Security (2019)

previous disabled Page of 2