Autonomous Cyber Deception 2019
DOI: 10.1007/978-3-030-02110-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Analysis of Deception Games Based on Hypergame Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…This, in contrast to the “principal-agent” models, makes it possible to exclude strategies with explicit deceptive manipulation of information. At the same time, like in hypergame models ( Cho et al., 2019 ), we place the possibility of being deceived outside the game into the probabilistic assessment g and assume that within one period of the game it is impossible to reduce the epistemic uncertainty associated with it.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…This, in contrast to the “principal-agent” models, makes it possible to exclude strategies with explicit deceptive manipulation of information. At the same time, like in hypergame models ( Cho et al., 2019 ), we place the possibility of being deceived outside the game into the probabilistic assessment g and assume that within one period of the game it is impossible to reduce the epistemic uncertainty associated with it.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…In addition, they found that many techniques are unable to meet the proposed security definition while emphasizing the importance of assessing deceptive patches based on a clear and meaningful security definition. Cho et al [48] modeled a deception game based on hypergame theory in which an attacker and a defender have different perceptions in a given game. This work examined how a player's (mis)perception can affect its decision making to choose strategies to take, which can affect the player's utility in the given game.…”
Section: ) Honey Patchesmentioning
confidence: 99%
“…• Advanced persistent threats (APT) [48,72,75,87,105,106,124]: An APT attack is the most well-known sophisticated attack performing different types of attacks in the stages of the cyber kill chain (CKC) [103]. In particular, gametheoretic defensive deception research has considered the APT attack but mostly focused on the attacks during the reconnaissance stage.…”
Section: Attacks Countermeasured By Defensive Deception Techniquesmentioning
confidence: 99%
“…A large part of this work is based on game theory and attempts to find equilibria in the presence of attackers and defenders of a certain skill or optimize defense and attack strategies. These approaches comprise Stackelberg Games [1,38], Zero-Determinant Theory [40], empirical game-theoretic analysis [36], Markov modeling [18,27,30,41,42], as well as stochastic petri nets [7,14]. However, none of them attempt to determine a given technique's real effects.…”
Section: Related Workmentioning
confidence: 99%