2019
DOI: 10.1145/3357605
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Attack & Defense in Security Diffusion Games

Abstract: Security games model the confrontation between a defender protecting a set of targets and an attacker who tries to capture them. A variant of these games assumes security interdependence between targets, facilitating contagion of an attack. So far, only stochastic spread of an attack has been considered. In this work, we introduce a version of security games, where the attacker strategically drives the entire spread of attack and where interconnections between nodes affect their susceptibility to be captured. … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Minimum-cost SAT-solvers were used by Huang et al to distill critical parts of attack graphs, which are used for preparing defenses [25]. Other approaches, such as the use of diffusion games [26], have also been proposed for hardening the security of networks. In this work, our focus is on producing real-time security plans using methods to parallelize attack graph analysis and security improvement planning.…”
Section: Related Workmentioning
confidence: 99%
“…Minimum-cost SAT-solvers were used by Huang et al to distill critical parts of attack graphs, which are used for preparing defenses [25]. Other approaches, such as the use of diffusion games [26], have also been proposed for hardening the security of networks. In this work, our focus is on producing real-time security plans using methods to parallelize attack graph analysis and security improvement planning.…”
Section: Related Workmentioning
confidence: 99%
“…The attacker applied a node capture attack [7,8,9] through confiscating few vertices over WSN to use vertices information maliciously. The information about routing strategies, cipher keys and cipher text are to be utilized spitefully by attacker [10,11,12].…”
Section: Introductionmentioning
confidence: 99%
“…In real life, players do not necessarily use large-scale policy sets to find the best strategies. The calculation results of the above methods are the best, but the blocker and the spreader are more likely to use representative typical strategies to get effective results quickly [27,34].…”
Section: Introductionmentioning
confidence: 99%