2017
DOI: 10.1109/access.2017.2691326
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(26 citation statements)
references
References 17 publications
0
25
0
1
Order By: Relevance
“…Cyber physical system is a critical infrastructure for our society and an appealing target for network attacks. As an advanced and stealthy network attack, APT attack can steal the interactive information between the cyber layer and the physical layer continually and stealthyly [21], [23]. In order to defense the APT attack, too many security tools are deployed to against it such as firewall [6] and IDS [7].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Cyber physical system is a critical infrastructure for our society and an appealing target for network attacks. As an advanced and stealthy network attack, APT attack can steal the interactive information between the cyber layer and the physical layer continually and stealthyly [21], [23]. In order to defense the APT attack, too many security tools are deployed to against it such as firewall [6] and IDS [7].…”
Section: Related Workmentioning
confidence: 99%
“…Xiao et al [22] applied cumulative prospect theory to study the interactions between a cyber system and an APT attacker when each player makes subjective decisions to choose their scan interval and attack interval, respectively. Abass et al [23] formulated two boundedly rational APT static games to analyze cloud storage against APT attacker based on the prospect theory. Saad et al [24] explored the potential of prospect theory as a decision-making framework that helps understand how risk and uncertainty can impact the decisions of the smart grid through the Prelec weighting function.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Evolutionary game has been successfuly applied to the areas of Advanced Persistent Threats (APTs), evolving interactions between an attacker and a defender, detecting DDOS, and wireless sensor networks. Alabdel Abass et al [30] studied APTs that represent stealthy, powerful, long-term, and well-funded attacks against cyber systems, such as smart grids, data centres and cloud storage. The authors capture the long-term continuous behaviour of the APTs on the cloud storage devices using evolutionary game.…”
Section: Related Workmentioning
confidence: 99%
“…Vejandla et al [35] present evolving gaming strategies for attackerdefender in a simulated network nnvironment. Alabdel Abass et al [2] studied Advanced Persistent Threats (APTs) that represent stealthy, powerful, long-term, and well-funded attacks against cyber systems, such as smart grids, data centers and cloud storage. The authors used evolutionary game theory to capture the long-term continuous behavior of the APTs on the cloud storage devices.…”
Section: Evolutionary Game For Securitymentioning
confidence: 99%