Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
DAPT 2020-constructing a benchmark dataset for advanced persistent threats
Abstract Machine learning is being embraced by information security researchers and
organizations alike for its potential in detecting attacks that an organization faces …
organizations alike for its potential in detecting attacks that an organization faces …
Autonomous security analysis and penetration testing
Security Assessment of large networks is a challenging task. Penetration testing (pentesting)
is a method of analyzing the attack surface of a network to find security vulnerabilities …
is a method of analyzing the attack surface of a network to find security vulnerabilities …
Multi-agent reinforcement learning in bayesian stackelberg markov games for adaptive moving target defense
S Sengupta, S Kambhampati - arXiv preprint arXiv:2007.10457, 2020 - arxiv.org
The field of cybersecurity has mostly been a cat-and-mouse game with the discovery of new
attacks leading the way. To take away an attacker's advantage of reconnaissance …
attacks leading the way. To take away an attacker's advantage of reconnaissance …
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things
X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …
[HTML][HTML] Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm
H Jin, S Zhang, B Zhang, S Dong, X Liu… - Journal of King Saud …, 2023 - Elsevier
In view of the differences and limitations of the cognitive abilities of both sides of network
security attack and defense, the current network defense decision-making methods using …
security attack and defense, the current network defense decision-making methods using …
General sum markov games for strategic detection of advanced persistent threats using moving target defense in cloud networks
The processing and storage of critical data in large-scale cloud networks necessitate the
need for scalable security solutions. It has been shown that deploying all possible detection …
need for scalable security solutions. It has been shown that deploying all possible detection …
Differential game approach for attack-defense strategy analysis in Internet of Things networks
Internet of Things (IoT) is vulnerable to various cyber attacks due to the massive deployment
of IoT devices and the openness of wireless environments. In this article, taking IoT devices …
of IoT devices and the openness of wireless environments. In this article, taking IoT devices …
[HTML][HTML] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
X Feng, J Han, R Zhang, S Xu, H Xia - High-Confidence Computing, 2024 - Elsevier
Currently, important privacy data of the Internet of Things (IoT) face extremely high risks of
leakage. Attackers persistently engage in continuous attacks on terminal devices to obtain …
leakage. Attackers persistently engage in continuous attacks on terminal devices to obtain …