The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization methodology is used to predict the attacker’s best actions at each decision node. The administrator also keeps tracking the attacker’s actions and updates his knowledge on the attacker’s behavior and objectives after each detected attack, and uses it to update the prediction of the attacker’s future actions. Instead of searching the entire game tree,...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
In network security hardening a network administrator may need to use limited resources (such as hon...
Improving network security is a difficult problem that requires balancing several goals, such as def...
Improving network security is a difficult problem that requires balancing several goals, such as def...
Improving network security is a difficult problem that requires balancing several goals, such as def...
Improving network security is a difficult problem that requires balancing several goals, such as def...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
The security systems built to secure the computer network systems have to addressdynamically changin...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
In network security hardening a network administrator may need to use limited resources (such as hon...
Improving network security is a difficult problem that requires balancing several goals, such as def...
Improving network security is a difficult problem that requires balancing several goals, such as def...
Improving network security is a difficult problem that requires balancing several goals, such as def...
Improving network security is a difficult problem that requires balancing several goals, such as def...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
The security systems built to secure the computer network systems have to addressdynamically changin...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...