2016
DOI: 10.1007/978-3-319-47413-7_22
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 20 publications
0
15
0
1
Order By: Relevance
“…In a follow-up study [53], the concept of artificial exposure has been improved as a signaling game framework that could probabilistically induce and make judgments to estimate evidence based on the sender type and transmitted message, thereby proving again that the concept is vulnerable to attackers who can analyze the signals. Mohammadi et al [54] have proposed a signaling game for identifying and deceiving external attackers using false defender avatars to optimize decoy strategies and alert thresholds. In that study, they defined the uncertainty of the judgment of the identity of the defender by the attacker who received signals from a real defender or a false defender avatar and considered the concept of insider authorization based on access control in the system architecture.…”
Section: Game-theoretic Defensive Deception With Non-mtdmentioning
confidence: 99%
“…In a follow-up study [53], the concept of artificial exposure has been improved as a signaling game framework that could probabilistically induce and make judgments to estimate evidence based on the sender type and transmitted message, thereby proving again that the concept is vulnerable to attackers who can analyze the signals. Mohammadi et al [54] have proposed a signaling game for identifying and deceiving external attackers using false defender avatars to optimize decoy strategies and alert thresholds. In that study, they defined the uncertainty of the judgment of the identity of the defender by the attacker who received signals from a real defender or a false defender avatar and considered the concept of insider authorization based on access control in the system architecture.…”
Section: Game-theoretic Defensive Deception With Non-mtdmentioning
confidence: 99%
“…9. Mohammadi et al [2016] use signaling games to model the use of fake avatars as a type of honey-x. The avatars observe suspicious or non-suspicious activity from other user accounts in the network, and must form a belief about whether the other users are legitimate accounts or compromised accounts.…”
Section: Honey-xmentioning
confidence: 99%
“…The authors derive a complete set of closed form solutions. Mohammadi et al [2016] use signaling games to model the decision processes of a fake avatar that is defending a social network from attack. Figure 9 depicts the model using the signaling game formulated in Fig.…”
Section: Honey-xmentioning
confidence: 99%
See 1 more Smart Citation
“…The game-theoretic framework can be extended to reason about dynamical system properties and behavior traces. In [31], the authors formulate a deception with signaling game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. In [32], the authors propose a selective and dynamic mechanism for counterfingerprinting.…”
Section: Signaling Games For Cybersecuritymentioning
confidence: 99%