A survey of intrusion detection techniques
Computers and Security
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
Intrusion confinement by isolation in information systems
Journal of Computer Security - Special issue on database security
Using information security as a response to competitor analysis systems
Communications of the ACM
A BGP-based mechanism for lowest-cost routing
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Constructing attack scenarios through correlation of intrusion alerts
Proceedings of the 9th ACM conference on Computer and communications security
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
Aggregation and Correlation of Intrusion-Detection Alerts
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
A Different Look at Secure Distributed Computation
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Alert Correlation in a Cooperative Intrusion Detection Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Defending Against Denial-of-Service Attacks with Puzzle Auctions
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
BRITE: An Approach to Universal Topology Generation
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
A Trend Analysis of Exploitations
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Multi-agent influence diagrams for representing and solving games
IJCAI'01 Proceedings of the 17th international joint conference on Artificial intelligence - Volume 2
Game theoretic models for detecting network intrusions
Computer Communications
Cloaking games in location based services
Proceedings of the 2008 ACM workshop on Secure web services
Understanding the Value of Countermeasure Portfolios in Information Systems Security
Journal of Management Information Systems
Journal of Network and Computer Applications
Coexistence with malicious nodes: a game theoretic approach
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Towards behavioral control in multi-player network games
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
Journal of Management Information Systems
Security analysis of enterprise network based on stochastic game nets model
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
QoS-T: QoS throttling to elicit user cooperation in computer systems
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
A hybrid ranking approach to estimate vulnerability for dynamic attacks
Computers & Mathematics with Applications
Rational choice of security measures via multi-parameter attack trees
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Janus: a two-sided analytical model for multi-stage coordinated attacks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets
Security and Communication Networks
Methodologies for evaluating game theoretic defense against DDoS attacks
Proceedings of the Winter Simulation Conference
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
A novel approach to evaluate software vulnerability prioritization
Journal of Systems and Software
Towards cost-sensitive assessment of intrusion response selection
Journal of Computer Security
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad hoc and system or application specific. In this paper, we present a general incentive-based method to model AIOS and a game-theoretic approach to inferring AIOS. On one hand, we found that the concept of incentives can unify a large variety of attacker intents; the concept of utilities can integrate incentives and costs in such a way that attacker objectives can be practically modeled. On the other hand, we developed a game-theoretic AIOS formalization which can capture the inherent interdependency between AIOS and defender objectives and strategies in such a way that AIOS can be automatically inferred. Finally, we use a specific case study to show how attack strategies can be inferred in real-world attack--defense scenarios.