We study the problem of allocating limited security countermeasures to protect network data from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multistage interactions between a network administrator and cybercriminals, formulated as a security game. This formulation is capable of representing security environments with significant dynamics and uncertainty and very large strategy spaces. We propose parameterized heuristic strategies for the attacker and defender and provide detailed analysis of their time complexity. Our heuristics exploit the topological structure of attack graphs and employ sampling methods to overcome the computational complexity in predicting opponent actions. Due to the complexity of the ga...
The security systems built to secure the computer network systems have to addressdynamically changin...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
In network security hardening a network administrator may need to use limited resources (such as hon...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Security games involving the allocation of multiple security resources to defend multiple targets ge...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy t...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
The security systems built to secure the computer network systems have to addressdynamically changin...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
In network security hardening a network administrator may need to use limited resources (such as hon...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Security games involving the allocation of multiple security resources to defend multiple targets ge...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy t...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
The security systems built to secure the computer network systems have to addressdynamically changin...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...