2013
DOI: 10.1016/j.cose.2013.03.015
|View full text |Cite
|
Sign up to set email alerts
|

Active cyber defense with denial and deception: A cyber-wargame experiment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
22
0
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(25 citation statements)
references
References 5 publications
1
22
0
2
Order By: Relevance
“…Note that the left hand side of (27) is a symmetric idempotent matrix, however, the right hand side is not necessarily an idempotent matrix. • The results would hold if the message space was larger than p since it would also lead to the same constraint set Ψ (20). However, the derivations would not carry over if S had access to noisy version of the state instead of the actual state.…”
Section: Equilibrium Achieving Signaling Rulesmentioning
confidence: 95%
“…Note that the left hand side of (27) is a symmetric idempotent matrix, however, the right hand side is not necessarily an idempotent matrix. • The results would hold if the message space was larger than p since it would also lead to the same constraint set Ψ (20). However, the derivations would not carry over if S had access to noisy version of the state instead of the actual state.…”
Section: Equilibrium Achieving Signaling Rulesmentioning
confidence: 95%
“…In one real-time red-team versus blue-team cyber war game experiment, a honeypot system failed to deny red-team hackers access to the command and control mission system, but decoys and disinformation did succeed in preventing the adversary from obtaining sensitive data. 83 Importantly, network defense and deception are not just conducted by mindless algorithms. Law enforcement agents and computer security experts are tactically active in the cyber defense ecosystem.…”
Section: Engineering Deceptionmentioning
confidence: 99%
“…The entropy regulation terms in (10) and (11) result in a closed form of strategies and learning dynamics in (13). Without the closed form, distributed learners can adopt general learning schemes which combine the payoff and the strategy update as stated in [46].…”
Section: Heterogeneous and Hybrid Learningmentioning
confidence: 99%