Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








107 Hits in 8.7 sec

Cyber Deception for Computer and Network Security: Survey and Challenges [article]

Zhuo Lu, Cliff Wang, Shangqing Zhao
2020 arXiv   pre-print
Cyber deception has recently received increasing attentions as a promising mechanism for proactive cyber defense.  ...  Motivated by recent advances in cyber deception research, we in this paper provide a formal view of cyber deception, and review high-level deception schemes and actions.  ...  The research focused on establishing a dynamic game with incomplete information, and employed deceptive equilibrium strategies for network defense.  ... 
arXiv:2007.14497v1 fatcat:fddyekpkprarfopmf3bzpuxsxi

A Survey of Network Requirements for Enabling Effective Cyber Deception [article]

Md Abu Sayed, Moqsadur Rahman, Mohammad Ariful Islam Khan, Deepak Tosh
2024 arXiv   pre-print
By synthesizing insights from both theoretical and practical perspectives, we contribute to a comprehensive understanding of the network prerequisites crucial for enabling robust and adaptable cyber deception  ...  This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques.  ...  For instance, any security problem can be designed as a game between attacker and defender, consequently solving the game in terms of finding optimal strategies for players actually solves the security  ... 
arXiv:2309.00184v3 fatcat:aekdreuphfhgddatkimeqblh6u

Dynamic Hypergames for Synthesis of Deceptive Strategies with Temporal Logic Objectives [article]

Lening Li, Haoxiang Ma, Abhishek N. Kulkarni, Jie Fu
2020 arXiv   pre-print
Following the deceptive strategy, the agent chooses actions to influence the game history as well as to manipulate the adversary's perception so that it takes actions that benefit the goal of the agent  ...  A hypergame is a hierarchy of games, perceived differently by the agent and its adversary.  ...  Following the deceptive strategy, the agent chooses actions to influence the game history as well as to manipulate the adversary's perception so that it takes actions that benefit the goal of the agent  ... 
arXiv:2007.15726v1 fatcat:pl6kh7nz4jf47odj4sdfxsqley

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

The Doctrine of Cyber Effect: An Ethics Framework for Defensive Cyber Deception [article]

Quanyan Zhu
2023 arXiv   pre-print
To guide the design of defensive cyber deception, we develop a reasoning framework, the game of ethical duplicity, which is consistent with the doctrine.  ...  While originally intended for cyber deception, this doctrine has broader applicability, including for ethical issues such as AI accountability and controversies related to YouTube recommendations.  ...  Game-theoretic frameworks, such as signaling games [30, 43] , Bayesian games [44, 45] , and dynamic games [15, 16] , have proven to be powerful tools for developing effective deception strategies in  ... 
arXiv:2302.13362v1 fatcat:h5hxgpthxngojjm5pavd6s6afy

Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation [article]

Tao Zhang, Linan Huang, Jeffrey Pawlick, Quanyan Zhu
2019 arXiv   pre-print
Deception is a technique to mislead human or computer systems by manipulating beliefs and information.  ...  For the applications of cyber deception, non-cooperative games become a natural choice of models to capture the adversarial interactions between the players and quantitatively characterizes the conflicting  ...  [16] have considered a class of cyber deception techniques in the field of network security and studied the impact of the deception on attacker's beliefs using the quantitative framework of the game  ... 
arXiv:1902.03925v1 fatcat:setsnhv7ajfxvn6jadqedvfevy

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement

Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
2021 IEEE Access  
Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs.  ...  Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement.  ...  Cyber deception has attracted attention from security researchers and practitioners as an approach for designing secure cyber infrastructure.  ... 
doi:10.1109/access.2021.3069105 fatcat:5rsprlywnbfy3ikvmxm4fpns4y

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, Jung Taek Seo
2022 Sensors  
For a variety of purposes, deceptive and anti-deceptive technologies have been created.  ...  However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies.  ...  Combining a Deep Belief Network and a probabilistic neural network can result in a novel intrusion detection system that can be used to configure deception measures.  ... 
doi:10.3390/s22062194 pmid:35336373 pmcid:PMC8952217 fatcat:hgtvnjuzxfgudpa76fke433qhy

Goal Recognition Control under Network Interdiction Using a Privacy Information Metric

Junren Luo, Xiang Ji, Wei Gao, Wanpeng Zhang, Shaofei Chen
2019 Symmetry  
Goal recognition (GR) is a method of inferring the goals of other agents, which enables humans or AI agents to proactively make response plans.  ...  by manipulating the asymmetric information and delay the goal recognition process.  ...  Network Interdiction In the defense and security domain, interdiction refers to actions that serve to block or otherwise inhibit an adversary's operations [36] .  ... 
doi:10.3390/sym11081059 fatcat:52sfcko3ojhfhlmvz2lkplkaee

Informing Autonomous Deception Systems with Cyber Expert Performance Data [article]

Maxine Major, Brian Souza, Joseph DiVita, Kimberly Ferguson-Walter
2021 arXiv   pre-print
This paper discusses methods for improving the realism and ecological validity of AI used for autonomous cyber defense by exploring the potential to use Inverse Reinforcement Learning (IRL) to gain insight  ...  The Tularosa study, as one example, provides experimental data of real-world techniques and tools commonly used by attackers, from which core data vectors can be leveraged to inform an autonomous cyber  ...  Notable research evaluated different non-deceptive defense techniques against an active attacker in a cyber security simulation modeled as a Markov game with incomplete information.  ... 
arXiv:2109.00066v1 fatcat:to6ihgt6mvcmdo4tf6hv5qi6yq

Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks [article]

Tao Li, Yunian Pan, Quanyan Zhu
2023 arXiv   pre-print
To address these challenges, we propose a proactive end-to-end security scheme that utilizes a 5G satellite-guided air-ground network.  ...  We demonstrate the effectiveness of our game-theoretic design, which uses a meta-learning framework to enable zero-trust monitoring and decision-dominant defense against attackers in emerging multi-domain  ...  These frameworks provide a structured approach to design and enforce robust security measures that align with the principles of zero trust, enhancing the overall resilience and protection of 5G networks  ... 
arXiv:2310.01675v1 fatcat:pb7qmtywmrbt7b7s6anqea4w3a

Deceptive Kernel Function on Observations of Discrete POMDP [article]

Zhili Zhang, Quanyan Zhu
2020 arXiv   pre-print
We introduce deceptive kernel function (the kernel) applied to agent's observations in a discrete POMDP.  ...  This paper studies the deception applied on agent in a partially observable Markov decision process.  ...  Horák et al. in [6] have adopted the model of one-sided partially observable stochastic game (POSG) and discussed the proactive deceptive actions by the defender as an approach to manipulate the adversary's  ... 
arXiv:2008.05585v1 fatcat:uyl3ryghuva5dfox3gfp2j7r6a

Cyber-Resilience Approaches for Cyber-Physical Systems [article]

Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquin Garcia-Alfaro
2023 arXiv   pre-print
We first provide preliminaries and background on CPS and threats, and subsequently survey state-of-the-art approaches that have been proposed by recent research work applicable to CPS.  ...  CPS integrate sensing, computation, control and networking into physical objects and mission-critical services, connecting traditional infrastructure to internet technologies.  ...  Acknowledgements -The authors thank the anonymous referees for their valuable comments and helpful suggestions.  ... 
arXiv:2302.05402v1 fatcat:kxa3npuv2fblrdmwpweqc4ca34

From Tactical to Strategic Deception Detection: Application of Psychological Synthesis

Iain Reid, Lynsey Gozna, Julian Boon
2017 Journal of Strategic Security  
An illustration of how such an approach may work is provided through a scenario of a terrorist incident and how a tailored deception detection approach may seek to counter such a threat.  ...  practitioner model for use in secure and community forensic settings.  ...  is a requirement for a synthesis of approaches.  ... 
doi:10.5038/1944-0472.10.1.1528 fatcat:mqk544p2w5ca5ekafeqx2sr6by

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice [article]

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches
2021 arXiv   pre-print
A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks.  ...  This book aims to stipulate the inclusion of security in robotics from the earliest design phases onward and with a special focus on the cost-benefit tradeoff that can otherwise be an inhibitor for the  ...  Acknowledgements The authors would like to thank the support that we receive from our institutions. We thank many of our friends and colleagues for their inputs and suggestions.  ... 
arXiv:2103.05789v4 fatcat:p3inkof6kbh3rds6jigvmq4doe
« Previous Showing results 1 — 15 out of 107 results