2017
DOI: 10.1109/tifs.2017.2710945
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Logic of Cyber Deception

Abstract: Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers in response to scan requests. If the attacker believes that all scan results are true, then he will be on a wrong path. If he believes some scan results are faked, he would have to expend time and effort in order to separate fact from fiction. We propose a probabilistic logic of deception an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3
3

Relationship

3
7

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 38 publications
0
20
0
Order By: Relevance
“…Several efforts focus on detecting exfiltration of sensitive information by Android applications through two major techniques: taint data flow tracking [11,26,35,61,78] and-more recentlynetwork traffic analysis [18,38,46,50,51,65,71,82]. Taint data flow tracking systems (e.g.…”
Section: Information Leakage Detectionmentioning
confidence: 99%
“…Several efforts focus on detecting exfiltration of sensitive information by Android applications through two major techniques: taint data flow tracking [11,26,35,61,78] and-more recentlynetwork traffic analysis [18,38,46,50,51,65,71,82]. Taint data flow tracking systems (e.g.…”
Section: Information Leakage Detectionmentioning
confidence: 99%
“…The group significantly contributes to the formation of CSA [4,7], to models underlying CSA [5,40,50], and to CSA measurement [35]. Further, the group investigated the concept of attack graphs and their application in CSA [74][75][76], network hardening [94] along with relevant strategies [6], and cyber deception [3,51,52]. The group has also developed a framework for cyber situational awareness that integrates an array of techniques and automated tools [48,71].…”
Section: Research Groupsmentioning
confidence: 99%
“…We also report AUC and show that it remains high in the different scenarios even when 20% or 30% of the training set is used. This allows the defender to use a moving defense surface [19], [20] by changing the specific training set over time while maintaining good predictive accuracy (AUC) performance.…”
Section: Accuracy-robustness Trade-off Of Dbank's Tsg Vs Traditional mentioning
confidence: 99%