2019
DOI: 10.1145/3337772
|View full text |Cite
|
Sign up to set email alerts
|

A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Abstract: Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this paper, we survey 24 articles from 2008-2018 that use game theory to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3
2

Relationship

5
3

Authors

Journals

citations
Cited by 125 publications
(82 citation statements)
references
References 46 publications
0
82
0
Order By: Relevance
“…To combat adversarial deceptions where the deceiver is the attacker, a defender can also initiate defensive deception techniques [17] such as perturbations via external noises, obfuscations via revealing useless information, or honeypot deployments. A honeypot which appears to contain valuable information can lure attackers into isolation and surveillance.…”
Section: Introductionmentioning
confidence: 99%
“…To combat adversarial deceptions where the deceiver is the attacker, a defender can also initiate defensive deception techniques [17] such as perturbations via external noises, obfuscations via revealing useless information, or honeypot deployments. A honeypot which appears to contain valuable information can lure attackers into isolation and surveillance.…”
Section: Introductionmentioning
confidence: 99%
“…They are useful to describe outcomes of different types of interactions among players. For a detailed exposition of basic concepts of equilibrium solutions, we refer the reader to [27], [28]; and for a review of game-theoretic applications to cyber security, we refer readers to [20], [31]- [33].…”
Section: B Game-theoretic Methodsmentioning
confidence: 99%
“…The idea of using deceptions defensively to detect and deter attacks has been studied theoretically as listed in the taxonomic survey [8], implemented to the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK T M ) adversary model system [9], and tested in the real-time cyber-wargame experiment [10]. Many previous works imply the similar idea of type obfuscation, e.g., creating social network avatars (fake personas) on the major social networks [11], implementing honey files for ransomware actions [12], and disguising a production system as a honeypot to scare attackers away [13].…”
Section: Literaturementioning
confidence: 99%
“…The indicators in (8) mean that both players only update the estimate average risk of the current action.…”
Section: Distributed Learningmentioning
confidence: 99%
See 1 more Smart Citation