A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

Deceiving cyber adversaries: A game theoretic approach

A Schlenker, O Thakoor, H Xu, F Fang… - … '18: Proceedings of …, 2018 - wrap.warwick.ac.uk
An important way cyber adversaries find vulnerabilities in modern networks is through
reconnaissance, in which they attempt to identify configuration specifics of network hosts. To …

[图书][B] New dimensions of information warfare

R Di Pietro, S Raponi, M Caprolu, S Cresci, R Di Pietro… - 2021 - Springer
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …

Generating fake documents using probabilistic logic graphs

Q Han, C Molinaro, A Picariello, G Sperli… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Past research has shown that over 8 months may elapse between the time when a network
is compromised and the time the attack is discovered. During this long gap, attackers can …

A differentially private game theoretic approach for deceiving cyber adversaries

D Ye, T Zhu, S Shen, W Zhou - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber deception is one of the key approaches used to mislead attackers by hiding or
providing inaccurate system information. There are two main factors limiting the real-world …

SoK: Contemporary issues and challenges to enable cyber situational awareness for network security

M Husák, T Jirsík, SJ Yang - … of the 15th International Conference on …, 2020 - dl.acm.org
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …

A data-driven characterization of modern Android spyware

F Pierazzi, G Mezzour, Q Han, M Colajanni… - ACM Transactions on …, 2020 - dl.acm.org
According to Nokia's 2017 Threat Intelligence Report, 68.5% of malware targets the Android
platform; Windows is second with 28%, followed by iOS and other platforms with 3.5%. The …

Hardening networks against strategic attackers using attack graph games

K Durkota, V Lisý, B Bošanský, C Kiekintveld… - Computers & …, 2019 - Elsevier
We consider the problem faced by a network administrator (defender) when deploying
limited security resources to protect a network against a strategic attacker. To evaluate the …

Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures

N Cifranic, RA Hallman, J Romero-Mariona, B Souza… - Internet of Things, 2020 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) networks enable the connection
of distributed physical components to critical infrastructures (eg, electricity generation and …