Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection

P Parrend, J Navarro, F Guigou, A Deruyver… - EURASIP Journal on …, 2018‏ - Springer
Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very
network where they are taking place. This review proposes a comprehensive framework for …

From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015‏ - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

Honeypot allocation for cyber deception under uncertainty

AH Anwar, CA Kamhoua, NO Leslie… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Cyber deception aims to misrepresent the state of the network to mislead the attackers,
falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots …

Solving partially observable stochastic games with public observations

K Horák, B Bošanský - Proceedings of the AAAI conference on artificial …, 2019‏ - ojs.aaai.org
In many real-world problems, there is a dynamic interaction between competitive agents.
Partially observable stochastic games (POSGs) are among the most general formal models …

[PDF][PDF] Trends and applications in Stackelberg security games

D Kar, TH Nguyen, F Fang, M Brown… - Handbook of dynamic …, 2017‏ - andrew.cmu.edu
Security is a critical concern around the world, whether it is the challenge of protecting ports,
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …

Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games

K Horák, B Bošanský, P Tomášek, C Kiekintveld… - Computers & …, 2019‏ - Elsevier
Partially observable stochastic games (POSGs) are a general game-theoretic model for
capturing dynamic interactions where players have partial information. The existing …

Heuristic search value iteration for one-sided partially observable stochastic games

K Horák, B Bošanský, M Pěchouček - Proceedings of the AAAI …, 2017‏ - ojs.aaai.org
Security problems can be modeled as two-player partially observable stochastic games with
one-sided partial observability and infinite horizon (one-sided POSGs). We seek for optimal …

Learning near-optimal intrusion responses against dynamic attackers

K Hammar, R Stadler - IEEE Transactions on Network and …, 2023‏ - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stop** game where attack and defense strategies evolve …

Game theoretic approaches to attack surface shifting

PK Manadhata - Moving target defense II: Application of game theory …, 2012‏ - Springer
A software system's attack surface is the set of ways in which the system can be attacked. In
our prior work, we introduced an attack surface measurement and reduction method to …

[PDF][PDF] Security scheduling for real-world networks

M Jain, V Conitzer, M Tambe - Proceedings of the 2013 …, 2013‏ - aamas.csc.liv.ac.uk
Network based security games, where a defender strategically places security measures on
the edges of a graph to protect against an adversary, who chooses a path through a graph is …