2019
DOI: 10.3390/e21090909
|View full text |Cite
|
Sign up to set email alerts
|

Applying the Bayesian Stackelberg Active Deception Game for Securing Infrastructure Networks

Abstract: With new security threats cropping up every day, finding a real-time and smart protection strategy for critical infrastructure has become a big challenge. Game theory is suitable for solving this problem, for it provides a theoretical framework for analyzing the intelligent decisions from both attackers and defenders. However, existing methods are only based on complete information and only consider a single type of attacker, which is not always available in realistic situations. Furthermore, although infrastr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 50 publications
0
10
0
Order By: Relevance
“…Deception-based defenses are potent weapons that have been proven to work in various domains. Their efficacy is based on the fact that they are programmed to exploit key biases to appear realistic but misleading substitutes to the hidden reality [ 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 ]. As a result, one will require a thorough understanding of both offensive and defensive trickery to implement a perfect Deception strategy.…”
Section: Discussionmentioning
confidence: 99%
“…Deception-based defenses are potent weapons that have been proven to work in various domains. Their efficacy is based on the fact that they are programmed to exploit key biases to appear realistic but misleading substitutes to the hidden reality [ 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 ]. As a result, one will require a thorough understanding of both offensive and defensive trickery to implement a perfect Deception strategy.…”
Section: Discussionmentioning
confidence: 99%
“…To address the challenge of CPS security, researchers have paid a great attention on the security issues of malwares propagation, such as propagation modeling, prevention, detection, and mitigation [ 20 , 21 , 22 ]. However, the unprotected exposure is usually neglected and few of them have considered the trade-off between safety and security when using light-weight countermeasures.…”
Section: Related Workmentioning
confidence: 99%
“…In order to take attackers reaction into account, Durkota et al [ 43 ] studied the optimal strategy making of placement of honeypots in a network using a game-theoretic approach. Using the Bayesian Stackelberg Game, Zeng, et al [ 22 ] studied the problem of infrastructure network protection under asymmetry information in which multiple attackers types were considered and Bayesian Stackelberg game was introduced to model this problem.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [17] applied a Stackelberg game model to complex networks and evaluated the effects of cost-sensitive parameters. Zeng et al [18,19] proposed a false network construction method and applied Stackelberg and Bayesian Stackelberg game models for the defense of critical infrastructure networks. Fu et al [20] established a Stackelberg game model based on camouflage strategies and proposed an evolutionary rule to optimize these strategies.…”
Section: Introductionmentioning
confidence: 99%