2019 American Control Conference (ACC) 2019
DOI: 10.23919/acc.2019.8814596
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…In other words, the game models in [17]- [20] assume that security analysis performed by DIFT can verify the authenticity of tagged information flows accurately. A stochastic game model for detecting APTs was recently introduced in [21]. Paper [21] analyzed a discounted stochastic game and presented a value iteration based algorithm to obtain an ε-NE of the discounted game.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, the game models in [17]- [20] assume that security analysis performed by DIFT can verify the authenticity of tagged information flows accurately. A stochastic game model for detecting APTs was recently introduced in [21]. Paper [21] analyzed a discounted stochastic game and presented a value iteration based algorithm to obtain an ε-NE of the discounted game.…”
Section: Related Workmentioning
confidence: 99%
“…A stochastic game model for detecting APTs was recently introduced in [21]. Paper [21] analyzed a discounted stochastic game and presented a value iteration based algorithm to obtain an ε-NE of the discounted game. In contrast to [21], this paper solves an average reward (undiscounted) game.…”
Section: Related Workmentioning
confidence: 99%
“…The game models in [34], [36], [37] are non-stochastic as the notions of false alarms and false-negatives are not considered. Recently, a stochastic model of DIFT-games was proposed in [38], [39] when the transition probabilities of the game are known. However, the transition probabilities, which are the rates of generation of false alarms and false negatives at the different system components, are often unknown.…”
Section: A Related Workmentioning
confidence: 99%
“…Recently, the authors in [32] propose a two player mixed strategy game to address a dynamic resource-planning problem between an attacker targeting the communication equipment and a defender protecting the control network. Similar frameworks have also been deployed to model the dynamics of information flow between an advanced persistent threat and a detector [30,29].…”
Section: Introductionmentioning
confidence: 99%