Fingerprinting,which is an important part of reconnaissance,the first stage of network attack killing chain,is the prerequisite of successful implementation of network attack.The promotion of the concept of active defense,especially deception defense,encourages the defenders to confuse the attackers by means of fingerprint information hiding and obfuscation,thus reducing the effectiveness of their network reconnaissance.Therefore,the defenders can obtain a certain first-mover advantage in the confrontation,and the confrontation of both sides is also advanced to the stage of reconnaissance.Deception is the strategic confrontation between the rational agents of both sides,game theory is a quantitative science to study the conflict and coopera...
While there are significant advances in information technology and infrastructure which offer new op...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Abstract. Attackers of computing resources increasingly aim to keep security compromises hidden from...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
In this paper, the game theoretical analysis method is presented to provide optimal strategies for a...
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy t...
Increasingly, more administrators (defenders) are using defense strategies with deception such as ho...
While there are significant advances in information technology and infrastructure which offer new op...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Abstract. Attackers of computing resources increasingly aim to keep security compromises hidden from...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
In this paper, the game theoretical analysis method is presented to provide optimal strategies for a...
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy t...
Increasingly, more administrators (defenders) are using defense strategies with deception such as ho...
While there are significant advances in information technology and infrastructure which offer new op...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...