Attacker-Centric View of a Detection Game against Advanced Persistent Threats
نویسندگان
چکیده
منابع مشابه
Defending Against Advanced Persistent Threats Using Game-Theory
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailab...
متن کاملProtecting Industry 4.0 against Advanced Persistent Threats
The SADCIP project has arisen from the need to deal with increasingly intelligent and autonomous industrial and monitoring systems, capable of collaborating with each other to meet a common objective: provide efficient and real-time manufacturing and logistics from anywhere, at any time and anyhow [1]. However, any new condition that implies open communication with the Internet and the adaptati...
متن کاملDefense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
Advanced Persistent Threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their Central Processing Units (CPUs) over ...
متن کاملOptimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a powerful defender uses honeynets for active defense in order to observe an attacke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2018
ISSN: 1536-1233,1558-0660,2161-9875
DOI: 10.1109/tmc.2018.2814052