2023
DOI: 10.1109/tsmc.2022.3211866
|View full text |Cite
|
Sign up to set email alerts
|

Learning Games for Defending Advanced Persistent Threats in Cyber Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…Although a growing body of work uses reinforcement learning and game theory to find intrusion response strategies (see Section VII), a direct comparison between the defender strategies learned in our framework and those found in previous work is not feasible for two reasons. First, nearly all of the prior works have developed defender strategies for custom simulations [8], [10], [10], [11], [18]- [27], [33]- [35], [38], [39], [60], [62], [63], [67]- [72], [107]- [119] and there is no obvious way to map their solutions to an emulated environment like ours (see Fig. 1 and Appendix C).…”
Section: A Learning Equilibrium Strategies Through Self-playmentioning
confidence: 99%
See 4 more Smart Citations
“…Although a growing body of work uses reinforcement learning and game theory to find intrusion response strategies (see Section VII), a direct comparison between the defender strategies learned in our framework and those found in previous work is not feasible for two reasons. First, nearly all of the prior works have developed defender strategies for custom simulations [8], [10], [10], [11], [18]- [27], [33]- [35], [38], [39], [60], [62], [63], [67]- [72], [107]- [119] and there is no obvious way to map their solutions to an emulated environment like ours (see Fig. 1 and Appendix C).…”
Section: A Learning Equilibrium Strategies Through Self-playmentioning
confidence: 99%
“…The game is modeled in different ways depending on the use case. Examples from the literature include: advanced persistent threat games [54], [66]- [68], [71], [108], [109], [150], honeypot placement games [112]- [114], resource allocation games [38], [151], authentication games [8], distributed denial-of-service games [115], [120], situational awareness games [152], [153], moving target defense games [107], [154], and intrusion response games [10], [28], [45], [50], [72], [111], [116]- [119], [121]. These games are formulated using various models from the gametheoretic literature.…”
Section: A Game-theoretic Modeling In Network Securitymentioning
confidence: 99%
See 3 more Smart Citations