A survey of interdependent information security games
Risks faced by information system operators and users are not only determined by their own
security posture, but are also heavily affected by the security-related decisions of others …
security posture, but are also heavily affected by the security-related decisions of others …
Attacker-centric view of a detection game against advanced persistent threats
Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …
FlipThem: Modeling targeted attacks with FlipIt for multiple resources
Recent high-profile targeted attacks showed that even the most secure and secluded
networks can be compromised by motivated and resourceful attackers, and that such a …
networks can be compromised by motivated and resourceful attackers, and that such a …
Defense against advanced persistent threats in dynamic cloud storage: A colonel blotto game approach
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to
continuously and stealthily steal information from the targeted cloud storage systems and …
continuously and stealthily steal information from the targeted cloud storage systems and …
Empirical game-theoretic analysis for moving target defense
The effectiveness of a moving target defense depends on how it is deployed through specific
system operations over time, and how attackers may respond to this deployment. We define …
system operations over time, and how attackers may respond to this deployment. We define …
A game theoretic model for defending against stealthy attacks with limited resources
Stealthy attacks are a major threat to cyber security. In practice, both attackers and
defenders have resource constraints that could limit their capabilities. Hence, to develop …
defenders have resource constraints that could limit their capabilities. Hence, to develop …
Stealthy attacks meets insider threats: A three-player game model
Advanced persistent threat (APT) is becoming a major threat to cyber security. As APT
attacks are often launched by well funded entities that are persistent and stealthy in …
attacks are often launched by well funded entities that are persistent and stealthy in …
Optimal thresholds for anomaly-based intrusion detection in dynamical environments
In cyber-physical systems, malicious and resourceful attackers could penetrate a system
through cyber means and cause significant physical damage. Consequently, early detection …
through cyber means and cause significant physical damage. Consequently, early detection …
Optimal timing of moving target defense: A Stackelberg game model
As an effective approach to thwarting advanced attacks, moving target defense (MTD) has
been applied to various domains. Previous works on MTD, however, mainly focus on …
been applied to various domains. Previous works on MTD, however, mainly focus on …
FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage
One of the particularly daunting issues in the cybersecurity domain is information leakage of
business or consumer data, which is often triggered by multi-stage attacks and advanced …
business or consumer data, which is often triggered by multi-stage attacks and advanced …