Adaptive cyberdefense with deception: A human–ai cognitive approach

C Gonzalez, P Aggarwal, EA Cranford… - … , Strategies, and Human …, 2022 - Springer
Achieving a level of dynamic and adaptive autonomy in cyber defense is highly desirable to
advance the capabilities of cyber defense to a whole new level of effectiveness. In such a …

A Multiagent CyberBattleSim for RL Cyber Operation Agents

T Kunz, C Fisher, J La Novara-Gsell… - 2022 International …, 2022 - ieeexplore.ieee.org
Hardening cyber physical assets is both crucial and labor-intensive. Recently, Machine
Learning (ML) in general and Reinforcement Learning RL) more specifically has shown …

Optimally Blending Honeypots into Production Networks: Hardness and Algorithms

MMU Zaman, L Tao, M Maldonado, C Liu… - … Conference on Science …, 2023 - Springer
Honeypot is an important cyber defense technique that can expose attackers' new attacks
(eg, zero-day exploits). However, the effectiveness of honeypots has not been systematically …

Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception

M Farrag, SG Sayed, M Zamzam - 2024 7th International …, 2024 - ieeexplore.ieee.org
In the digital age, the proliferation of cyber threats necessitates advanced cybersecurity
solutions. This paper introduces “Bluff,” an innovative cybersecurity platform designed to …

The pitfalls of evaluating cyber defense techniques by an anonymous population

A Aljohani, J Jones - International Conference on Human-Computer …, 2022 - Springer
In this work, we report on the results of recruiting anonymous (yet qualified) participants from
Prolific, a crowdsourcing platform, to engage in hacking experiments that involve defensive …

[HTML][HTML] Human Factors in Cybersecurity, Vol. 127, 2024, 115–126 AHFE

P Aggarwal¹, S Venkatesan, J Youzwak… - Human Factors in …, 2024 - books.google.com
Understanding a cyber attacker's behavior can help improve cyber defenses. However,
currently, there are no substantial publicly available datasets to learn about attackers' …

[PDF][PDF] Discovering Cognitive Biases in Cyber Attackers' Network Exploitation Activities: A Case Study

P Aggarwal, S Venkatesan, J Youzwak, R Chadha… - 2024 - cmu.edu
Understanding a cyber attacker's behavior can help improve cyber defenses. However,
currently, there are no substantial publicly available datasets to learn about attackers' …

On Evaluating Cyber Defense by Humans and Reinforcement Learning Agents

A Aljohani - 2023 - search.proquest.com
A significant factor that drives the investment in/integration of a cyber defense technique is
its proven effectiveness, in terms of performance, usability, and security, against an intended …

Принцип синтезу мультикомп'ютерних систем з комбінованих антивірусних приманок і пасток та контролеру прийняття рішень для виявлення зловмисного …

А КАШТАЛЬЯН - MEASURING AND COMPUTING DEVICES IN …, 2023 - vottp.khmnu.edu.ua
Анотація В роботі наведено результати досліджень щодо deception-систем для
виявлення зловмисного програмного забезпечення та комп'ютерних атак. З цією метою …

[ZITATION][C] Concepts for novel capabilities supporting cyber threat intelligence

N Zacchia, M Dondo, A Taylor - 2022