Cybersecurity threat assessment integrating qualitative differential and evolutionary games

H Zhang, J Tan, X Liu, S Huang, H Hu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most current game theory-based cybersecurity analysis methods use traditional game
models, which do not meet realistic conditions of continuous dynamic changes in attack …

ADAPT: a game inspired attack-defense and performance metric taxonomy

CB Simmons, SG Shiva, HS Bedi… - Security and Privacy …, 2013 - Springer
Game theory has been researched extensively in network security demonstrating an
advantage of modeling the interactions between attackers and defenders. Game theoretic …

Towards realistic threat modeling: Attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

L Allodi, S Etalle - Proceedings of the 2017 Workshop on Automated …, 2017 - dl.acm.org
Current threat models typically consider all possible ways an attacker can penetrate a
system and assign probabilities to each path according to some metric (eg time-to …

A game theory based risk and impact analysis method for intrusion defense systems

Y Luo, F Szidarovszky, Y Al-Nashif… - 2009 IEEE/ACS …, 2009 - ieeexplore.ieee.org
An enormous amount of functions in our everyday life became dependent on computer
networks. Network attacks become more sophisticated and perplexing. Defending against …

Cyber epidemics: Modeling attacker-defender dynamics in critical infrastructure systems

E Canzani, S Pickl - Advances in Human Factors in Cybersecurity …, 2016 - Springer
Cyber warfare presents a major potential threat to critical infrastructures (CIs). Decision
makers who want to develop resilient CIs must consider both strategic and operational …

Attack-defense differential game model for network defense strategy selection

H Zhang, LV Jiang, S Huang, J Wang, Y Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
The existing game-theoretic approaches for network security problems mostly use the static
game or the multi-stage dynamic game. However, these researches can not meet the …

Optimal network defense strategy selection method: a stochastic differential game model

Y Mi, H Zhang, H Hu, J Tan… - Security and …, 2021 - Wiley Online Library
In a real‐world network confrontation process, attack and defense actions change rapidly
and continuously. The network environment is complex and dynamically random. Therefore …

Security measurement for unknown threats based on attack preferences

L Yin, Y Sun, Z Wang, Y Guo, F Li… - Security and …, 2018 - Wiley Online Library
Security measurement matters to every stakeholder in network security. It provides security
practitioners the exact security awareness. However, most of the works are not applicable to …

Incentive-based modeling and inference of attacker intent, objectives, and strategies

P Liu, W Zang, M Yu - ACM Transactions on Information and System …, 2005 - dl.acm.org
Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may
dramatically advance the literature of risk assessment, harm prediction, and predictive or …

A game theoretical attack-defense model oriented to network security risk assessment

W He, C Xia, H Wang, C Zhang… - … conference on computer …, 2008 - ieeexplore.ieee.org
How to quantify the threat probability in network security risk assessment is an important
problem to be solved. Most of the existing methods tend to consider the attacker and …