2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS) 2020
DOI: 10.1109/iccps48487.2020.00009
|View full text |Cite
|
Sign up to set email alerts
|

Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The relevant research regarding this question has been observed to include different types of cyber attacks targeting specific platforms, such as personal computers and smartphones. On the one hand, as observed in Table 11, the AI techniques used against personal computers were machine learning [23,119,122,156,157], deep neural networks [158], game theory [159][160][161][162][163][164][165][166][167][168], fuzzy neural networks [169,170], and anomaly detection [123]. In research by [112], several machine learning classifiers were adopted, including naïve Bayes, Bayes net, K-nearest-neighbor (KNN), random forest, and SVM.…”
Section: Ai Techniques/algorithms Used To Detect Apts In Personal Com...mentioning
confidence: 99%
See 2 more Smart Citations
“…The relevant research regarding this question has been observed to include different types of cyber attacks targeting specific platforms, such as personal computers and smartphones. On the one hand, as observed in Table 11, the AI techniques used against personal computers were machine learning [23,119,122,156,157], deep neural networks [158], game theory [159][160][161][162][163][164][165][166][167][168], fuzzy neural networks [169,170], and anomaly detection [123]. In research by [112], several machine learning classifiers were adopted, including naïve Bayes, Bayes net, K-nearest-neighbor (KNN), random forest, and SVM.…”
Section: Ai Techniques/algorithms Used To Detect Apts In Personal Com...mentioning
confidence: 99%
“…A basic framework that splits a generic APT into three primary temporal periods was also presented in a study [165]. The DIFT has been presented as a viable approach for detecting and preventing various cyber attacks in computer systems [166].…”
Section: Ai Techniques/algorithms Used To Detect Apts In Personal Com...mentioning
confidence: 99%
See 1 more Smart Citation
“…On this basis, an optimal defense strategy selection algorithm for moving targets was proposed. Sahabandu et al [16] adopted Markov game to model Dynamic Information Flow Tracking (DIFT) and Advanced Persistent reats (APTs) as a two-person zero-sum game model and proposed Q-learning algorithm to solve the problem of APTs attack detection. Li et al [17] considered the optimal decisionmaking method of moving target defense and used Markov game method to calculate the optimal strategy in time and space, thus improving the value of the decision.…”
Section: Introductionmentioning
confidence: 99%