Different attackers navigate differently
نویسنده
چکیده
منابع مشابه
Empirical studies based on Honeypots for Characterizing Attackers Behavior
Title of Document: EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR Bertrand Sobesto, Doctor of Philosophy, 2015 Directed By: Associate Professor Michel Cukier Reliability Engineering Program The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is discovered, it is diffic...
متن کاملOn the Strategy and Behavior of Bitcoin Mining with N-attackers
Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers’ strategy space has been extended by many works. These works only analyze the strategy and behavior of one single attacker. The extension of the strategy space is based on the assumption that there is only one attacker in the blockchain network. However, a proof of work blockcha...
متن کاملOnline Learning Methods for Border Patrol Resource Allocation
We introduce a model for border security resource allocation with repeated interactions between attackers and defenders. The defender must learn the optimal resource allocation strategy based on historical apprehension data, balancing exploration and exploitation in the policy. We experiment with several solution methods for this online learning problem including UCB, sliding-window UCB, and EX...
متن کاملGuided Research Proposal Anonymization of SNMP traces
Simple Network Management Protocol (SNMP) is a protocol to access management and control information of network devices. It is a very lightweight protocol capable of easily monitoring thousands of devices simultaneously. Therefore, SNMP is used extensively in enterprise networks and by ISPs, especially for monitoring purposes. It is believed that SNMP is used differently in different environmen...
متن کاملSecurity-by-Experiment: Lessons from Responsible Deployment in Cyberspace
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environmen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016