A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

Game-theoretic and machine learning-based approaches for defensive deception: A survey

M Zhu, AH Anwar, Z Wan, JH Cho, C Kamhoua… - arXiv preprint arXiv …, 2021 - arxiv.org
Defensive deception is a promising approach for cyber defense. Via defensive deception,
the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real …

Towards a cognitive theory of cyber deception

EA Cranford, C Gonzalez, P Aggarwal… - Cognitive …, 2021 - Wiley Online Library
This work is an initial step toward developing a cognitive theory of cyber deception. While
widely studied, the psychology of deception has largely focused on physical cues of …

Toward personalized deceptive signaling for cyber defense using cognitive models

EA Cranford, C Gonzalez, P Aggarwal… - Topics in Cognitive …, 2020 - Wiley Online Library
Recent research in cybersecurity has begun to develop active defense strategies using
game‐theoretic optimization of the allocation of limited defenses combined with deceptive …

[HTML][HTML] Designing effective masking strategies for cyberdefense through human experimentation and cognitive models

P Aggarwal, O Thakoor, S Jabbari, EA Cranford… - Computers & …, 2022 - Elsevier
Masking strategies for cyberdefense (ie, disguising network attributes to hide the real state of
the network) are predicted to be effective in simulated experiments. However, it is unclear …

Adaptive cognitive mechanisms to maintain calibrated trust and reliance in automation

C Lebiere, LM Blaha, CK Fallon… - Frontiers in Robotics and …, 2021 - frontiersin.org
Trust calibration for a human–machine team is the process by which a human adjusts their
expectations of the automation's reliability and trustworthiness; adaptive support for trust …

Evaluating adaptive deception strategies for cyber defense with human adversaries

P Aggarwal, M Gutierrez, CD Kiekintveld… - Game Theory and …, 2021 - Wiley Online Library
We investigate the effectiveness of various algorithms for defensive cyber‐deception in an
adversarial decision‐making task using human experiments. Our combinatorial Multi‐Armed …

[PDF][PDF] Learning to play an adaptive cyber deception game

Y Du, Z Song, S Milani… - Proc. of the 21st …, 2022 - optlearnmas22.github.io
Due to the increase in cyber threats and the dynamic nature of cyber attacks, it is important
to use adaptive strategies to decide when and where to deploy the defense resources and …

Cognitive architectures and their applications

C Lebiere, EA Cranford, M Martin… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
Cognitive architectures are computational implementations of unified theories of cognition.
The consensus of 50 years of research in cognitive architectures can be captured in the form …

Understanding decision making in security operations centres: building the case for cyber deception technology

A Reeves, D Ashenden - Frontiers in Psychology, 2023 - frontiersin.org
Introduction A Security Operations Centre (SOC) is a command centre where analysts
monitor network activity, analyse alerts, investigate potential threats, and respond to …