2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162298
|View full text |Cite
|
Sign up to set email alerts
|

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Pham et al in [21] proposed a novel model to capture how advanced, stealthy adversaries acquire knowledge about the target network and establish and expand their foothold within the system. From the adversary's perspective, this model quantifies the cost and reward of compromising and maintaining control over target nodes.…”
Section: Algaolahi Et Al Inmentioning
confidence: 99%
“…Pham et al in [21] proposed a novel model to capture how advanced, stealthy adversaries acquire knowledge about the target network and establish and expand their foothold within the system. From the adversary's perspective, this model quantifies the cost and reward of compromising and maintaining control over target nodes.…”
Section: Algaolahi Et Al Inmentioning
confidence: 99%
“…[44,45] to simulate their deception system and combine it with their proposed work. Thakoor et al [132] used the CyberVan [41,109] as a network simulation testbed to simulate their game-theoretic cyberdeception techniques. Al Amin et al [6] and Bilinski et al [30] proposed a deceptive system which was simulated using a Markov decision processes.…”
Section: B Evaluation Testbedsmentioning
confidence: 99%
“…Similarly, Pham et al. [29] design a deceptive topology for virtual network from the perspective of stealthy attackers.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Almohri et al [9] propose to delay remote attackers by strategically placing decoys in the cloud network. Similarly, Pham et al [29] design a deceptive topology for virtual network from the perspective of stealthy attackers.…”
Section: Defensive Deception For Cloud Systemmentioning
confidence: 99%