A survey of interdependent information security games

A Laszka, M Felegyhazi, L Buttyan - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Risks faced by information system operators and users are not only determined by their own
security posture, but are also heavily affected by the security-related decisions of others …

Attacker-centric view of a detection game against advanced persistent threats

L **ao, D Xu, NB Mandayam… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …

FlipThem: Modeling targeted attacks with FlipIt for multiple resources

A Laszka, G Horvath, M Felegyhazi… - Decision and Game Theory …, 2014 - Springer
Recent high-profile targeted attacks showed that even the most secure and secluded
networks can be compromised by motivated and resourceful attackers, and that such a …

Defense against advanced persistent threats in dynamic cloud storage: A colonel blotto game approach

M Min, L **ao, C **e, M Hajimirsadeghi… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to
continuously and stealthily steal information from the targeted cloud storage systems and …

Empirical game-theoretic analysis for moving target defense

A Prakash, MP Wellman - Proceedings of the second ACM workshop on …, 2015 - dl.acm.org
The effectiveness of a moving target defense depends on how it is deployed through specific
system operations over time, and how attackers may respond to this deployment. We define …

A game theoretic model for defending against stealthy attacks with limited resources

M Zhang, Z Zheng, NB Shroff - Decision and Game Theory for Security …, 2015 - Springer
Stealthy attacks are a major threat to cyber security. In practice, both attackers and
defenders have resource constraints that could limit their capabilities. Hence, to develop …

Stealthy attacks meets insider threats: A three-player game model

X Feng, Z Zheng, P Hu, D Cansever… - MILCOM 2015-2015 …, 2015 - ieeexplore.ieee.org
Advanced persistent threat (APT) is becoming a major threat to cyber security. As APT
attacks are often launched by well funded entities that are persistent and stealthy in …

Optimal thresholds for anomaly-based intrusion detection in dynamical environments

A Ghafouri, W Abbas, A Laszka, Y Vorobeychik… - Decision and Game …, 2016 - Springer
In cyber-physical systems, malicious and resourceful attackers could penetrate a system
through cyber means and cause significant physical damage. Consequently, early detection …

Optimal timing of moving target defense: A Stackelberg game model

H Li, Z Zheng - MILCOM 2019-2019 IEEE Military …, 2019 - ieeexplore.ieee.org
As an effective approach to thwarting advanced attacks, moving target defense (MTD) has
been applied to various domains. Previous works on MTD, however, mainly focus on …

FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage

S Farhang, J Grossklags - Decision and Game Theory for Security: 7th …, 2016 - Springer
One of the particularly daunting issues in the cybersecurity domain is information leakage of
business or consumer data, which is often triggered by multi-stage attacks and advanced …