In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, but the uncertainty about his adversary prevents him from taking the favorable actions. How to select the best strategy from the candidate strategies to maximize the defense payoff becomes the core issue. For this purpose, the paper innovatively designs a game theory model from the point of network survivability in combination with the attribute attack graph. The attack graph is created based on the network connectivity and known vulnerabilities using the MulVAL toolkit, which gives the full view of all the known vulnerabilities and their interdependence. Then, we use the attack graph to extract attack-defense actions, candidate attack-defens...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
International audienceThis paper considers network protection games against different types of attac...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
In network security hardening a network administrator may need to use limited resources (such as hon...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Network defenders always face the problem of how to use limited resources to make the most reasonabl...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network c...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
Improving network security is a difficult problem that requires balancing several goals, such as def...
We analyze the distributed network attack-defense game scenarios, and we find that attackers and def...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
International audienceThis paper considers network protection games against different types of attac...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
In network security hardening a network administrator may need to use limited resources (such as hon...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Network defenders always face the problem of how to use limited resources to make the most reasonabl...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network c...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
Improving network security is a difficult problem that requires balancing several goals, such as def...
We analyze the distributed network attack-defense game scenarios, and we find that attackers and def...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
International audienceThis paper considers network protection games against different types of attac...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...