Game-Theoretic Threat Screening and Deceptive Techniques for Cyber Defense

被引:0
|
作者
Schlenker, Aaron [1 ]
机构
[1] Univ Southern Calif, Los Angeles, CA 90089 USA
来源
THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE | 2018年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
My research addresses the problem faced by a defender who must screen objects for potential threats that are coming into a secure area. The particular domain of interest for my work is the protection of cyber networks from intrusions given the presence of a strategic adversary. My thesis work allows for a defender to use game-theoretical methods that randomize her protection strategy and introduces uncertainty to the adversary that makes it more difficult to attack the defender's network successfully.
引用
收藏
页码:8034 / 8035
页数:2
相关论文
共 50 条
  • [21] GAIT: A Game-Theoretic Defense Against Intellectual Property Theft
    Zhang, Youzhi
    Chen, Dongkai
    Jajodia, Sushil
    Pugliese, Andrea
    Subrahmanian, V. S.
    Xiong, Yanhai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1967 - 1980
  • [22] Game-theoretic defense of adversarial distributed support vector machines
    Zhang, Rui
    Zhu, Quanyan
    Journal of Advances in Information Fusion, 2019, 14 (01): : 3 - 21
  • [23] Resource Allocation in Pollution Attack and Defense: A Game-Theoretic Perspective
    Tong, Wei
    Zhong, Sheng
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3057 - 3062
  • [24] A Survey of Cyber-Physical Systems From a Game-Theoretic Perspective
    Tushar, Wayes
    Yuen, Chau
    Saha, Tapan K. K.
    Nizami, Sohrab
    Alam, Mollah Rezaul
    Smith, David B. B.
    Poor, H. Vincent
    IEEE ACCESS, 2023, 11 : 9799 - 9834
  • [25] A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things
    Anwar, Ahmed H.
    Kamhoua, Charles
    Leslie, Nandi
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 522 - 526
  • [26] BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
    Guirguis, Mina
    Tahsini, Alireza
    Siddique, Khan
    Novoa, Clara
    Moore, Justin
    Julien, Christine
    Dunstatter, Noah
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [27] Cyber-Physical Correlations for Infrastructure Resilience: A Game-Theoretic Approach
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    2014 17TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2014,
  • [28] Jamming Attack on Cyber-Physical Systems: A Game-theoretic Approach
    Li, Yuzhe
    Shi, Ling
    Cheng, Peng
    Chen, Jiming
    Quevedo, Daniel E.
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 252 - +
  • [29] Infrastructure Resilience Using Cyber-Physical Game-Theoretic Approach
    Rao, Nageswara S., V
    Poole, Steve W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    2013 6TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2013, : 31 - 36
  • [30] Adversarial Intention Recognition as Inverse Game-Theoretic Planning for Threat Assessment
    Le Guillarme, Nicolas
    Mouaddib, Abdel-Illah
    Gatepaille, Sylvain
    Bellenger, Amandine
    2016 IEEE 28TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2016), 2016, : 698 - 705