Abstract. Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading “white ” or “benign ” worms to combat against the attackers ’ malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of optimal active cyber defense in the setting of strategic attackers and/or strategic defenders. Specifically, we investigate infinite-time horizon optimal control and fast optimal control for strategic defenders (who want to minimize their cost) against non-strategic attackers (who do not consider the issue of cost). We also investigate the Nash eq...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
We develop a model of a zero-sum information security game by introducing a reward function (called ...
We consider the problem of optimal investment in cyber-security by an enterprise. Optimality is meas...
The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
With the increasing connectivity among computational cyber-connected elements and physical entities,...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
While there are significant advances in information technology and infrastructure which offer new op...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
We develop a model of a zero-sum information security game by introducing a reward function (called ...
We consider the problem of optimal investment in cyber-security by an enterprise. Optimality is meas...
The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat to modern...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
With the increasing connectivity among computational cyber-connected elements and physical entities,...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
While there are significant advances in information technology and infrastructure which offer new op...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
We develop a model of a zero-sum information security game by introducing a reward function (called ...
We consider the problem of optimal investment in cyber-security by an enterprise. Optimality is meas...