2019
DOI: 10.1609/aimag.v40i1.2849
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception

Abstract: Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In contrast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs ab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…In that context, countering deception using sophisticated technologies and advanced tactics plays a crucial role in influencing the attacker's behaviors. The application of game theory and artificial intelligence algorithms has the potential to reduce the risks and increase the costs of attacker [24], which is the goal of the deterrence theory and the economics of crime model. The key to future prevention of privacy breaches will be a concerted effort of enforcement, monitoring, and education to quell what will undoubtedly be the continuing assault on privacy.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In that context, countering deception using sophisticated technologies and advanced tactics plays a crucial role in influencing the attacker's behaviors. The application of game theory and artificial intelligence algorithms has the potential to reduce the risks and increase the costs of attacker [24], which is the goal of the deterrence theory and the economics of crime model. The key to future prevention of privacy breaches will be a concerted effort of enforcement, monitoring, and education to quell what will undoubtedly be the continuing assault on privacy.…”
Section: Discussionmentioning
confidence: 99%
“…A likely perpetrator will commit a crime if the inequality presented in Figure 1 holds [22,23]. Game theory has been proposed as a mechanism to increase the negative returns and to decrease the positive returns to the perpetrator considering an illegal cybersecurity attack [24,25].…”
Section: Research On the Economics Of Crimementioning
confidence: 99%
“…The deception action space is where the potential to really disrupt and learn from a cyber attacker comes into play [27]. Deception does not need to be complicated; the Tularosa Study was limited to static, low-interaction decoys.…”
Section: Defensive Deception Action Spacementioning
confidence: 99%
“…An autonomous cyber deception solution can ease the burden on defenders and make intelligent, timely decisions on their behalf. A real-time, adaptive deception system, which can ingest inputs from defensive and deceptive sensors, can learn from adversarial activity in order to track and respond with customized deception to deter, delay, or misinform potential attackers [27]. Based on the defender's own terrain, this system would naturally be limited to data that is available to the defender, either through their own Intrusion Detection System (IDS) or security systems, or through deception tools such as decoys or tripwires planted in the network.…”
Section: Introductionmentioning
confidence: 99%
“…Duan et al [14] proposed an energy-aware trust derivation scheme using the game theoretic approach to manage overhead while maintaining adequate security of WSNs. Fugate and Ferguson [15] discussed techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how to optimally defend the system using cyber deception. Additional works are listed in Table 1.…”
Section: Related Workmentioning
confidence: 99%