A survey of defensive deception: Approaches using game theory and machine learning
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
Game-theoretic and machine learning-based approaches for defensive deception: A survey
Defensive deception is a promising approach for cyber defense. Via defensive deception,
the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real …
the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real …
Exploring information asymmetry in two-stage security games
Stackelberg security games have been widely deployed to protect real-word assets. The
main solution concept there is the Strong Stackelberg Equilibrium (SSE), which optimizes …
main solution concept there is the Strong Stackelberg Equilibrium (SSE), which optimizes …
Foureye: Defensive deception against advanced persistent threats via hypergame theory
Defensive deception techniques have emerged as a promising proactive defense
mechanism to mislead an attacker and thereby achieve attack failure. However, most game …
mechanism to mislead an attacker and thereby achieve attack failure. However, most game …
Imitative follower deception in stackelberg games
Information uncertainty is one of the major challenges facing applications of game theory. In
the context of Stackelberg games, various approaches have been proposed to deal with the …
the context of Stackelberg games, various approaches have been proposed to deal with the …
Modeling and analysis of deception games based on hypergame theory
In this chapter, we discuss a deception game where attackers and defenders can have
different perceptions towards a given situation. Although existing game theories have …
different perceptions towards a given situation. Although existing game theories have …
Flipit Game Deception Strategy Selection Method Based on Deep Reinforcement Learning
W He, J Tan, Y Guo, K Shang… - International Journal of …, 2023 - Wiley Online Library
The existing cyber deception decision‐making model based on game theory primarily
focuses on the selection of spatial strategies, which ignores the optimal defense timing and …
focuses on the selection of spatial strategies, which ignores the optimal defense timing and …
Learning and planning in the feature deception problem
Today's high-stakes adversarial interactions feature attackers who constantly breach the
ever-improving security measures. Deception mitigates the defender's loss by misleading …
ever-improving security measures. Deception mitigates the defender's loss by misleading …
Foureye: Defensive deception based on hypergame theory against advanced persistent threats
Defensive deception techniques have emerged as a promising proactive defense
mechanism to mislead an attacker and thereby achieve attack failure. However, most game …
mechanism to mislead an attacker and thereby achieve attack failure. However, most game …
Optimizing honey traffic using game theory and adversarial learning
Enterprises are increasingly concerned about adversaries that slowly and deliberately
exploit resources over the course of months or even years. A key step in this kill chain is …
exploit resources over the course of months or even years. A key step in this kill chain is …