A survey of defensive deception: Approaches using game theory and machine learning
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
Survey and taxonomy of adversarial reconnaissance techniques
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …
vulnerabilities in people and systems. The key to the success of these attacks is information …
Deceiving cyber adversaries: A game theoretic approach
An important way cyber adversaries find vulnerabilities in modern networks is through
reconnaissance, in which they attempt to identify configuration specifics of network hosts. To …
reconnaissance, in which they attempt to identify configuration specifics of network hosts. To …
[图书][B] New dimensions of information warfare
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …
that facilitated our everyday tasks. Over the years, new technologies have continually …
Generating fake documents using probabilistic logic graphs
Past research has shown that over 8 months may elapse between the time when a network
is compromised and the time the attack is discovered. During this long gap, attackers can …
is compromised and the time the attack is discovered. During this long gap, attackers can …
A differentially private game theoretic approach for deceiving cyber adversaries
Cyber deception is one of the key approaches used to mislead attackers by hiding or
providing inaccurate system information. There are two main factors limiting the real-world …
providing inaccurate system information. There are two main factors limiting the real-world …
SoK: Contemporary issues and challenges to enable cyber situational awareness for network security
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …
cybersecurity operators to cope with the complexity of today's networks and threat …
A data-driven characterization of modern Android spyware
According to Nokia's 2017 Threat Intelligence Report, 68.5% of malware targets the Android
platform; Windows is second with 28%, followed by iOS and other platforms with 3.5%. The …
platform; Windows is second with 28%, followed by iOS and other platforms with 3.5%. The …
Hardening networks against strategic attackers using attack graph games
We consider the problem faced by a network administrator (defender) when deploying
limited security resources to protect a network against a strategic attacker. To evaluate the …
limited security resources to protect a network against a strategic attacker. To evaluate the …
Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures
N Cifranic, RA Hallman, J Romero-Mariona, B Souza… - Internet of Things, 2020 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) networks enable the connection
of distributed physical components to critical infrastructures (eg, electricity generation and …
of distributed physical components to critical infrastructures (eg, electricity generation and …