A survey: When moving target defense meets game theory

J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

[PDF][PDF] A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.

S Sengupta, SG Vadlamudi, S Kambhampati… - …, 2017 - cotopaxi.eas.asu.edu
The present complexity in designing web applications makes software security a difficult
goal to achieve. An attacker can explore a deployed service on the web and attack at his/her …

Moving target defense for the placement of intrusion detection systems in the cloud

S Sengupta, A Chowdhary, D Huang… - Decision and Game …, 2018 - Springer
A lot of software systems are deployed in the cloud. Owing to realistic demands for an early
product launch, oftentimes there are vulnerabilities that are present in these deployed …

[PDF][PDF] Moving target defense for web applications using bayesian stackelberg games

SG Vadlamudi, S Sengupta, M Taguinod… - Proceedings of the …, 2016 - aamas.csc.liv.ac.uk
Vulnerabilities in web applications allow hackers to access and/or modify restricted data.
Here the hackers have the opportunity to perform reconnaissance so as to gain knowledge …

Analysis of a pairwise dominance coevolutionary algorithm and defendit

PK Lehre, M Hevia Fajardo, J Toutouh… - Proceedings of the …, 2023 - dl.acm.org
While competitive coevolutionary algorithms are ideally suited to model adversarial
dynamics, their complexity makes it difficult to understand what is happening when they …

Defender policy evaluation and resource allocation with MITRE ATT&CK evaluations data

AV Outkin, PV Schulz, T Schulz… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Protecting against multi-step attacks of uncertain start times and duration forces the
defenders into indefinite, always ongoing, resource-intensive response. To allocate …

A Self-adaptive Coevolutionary Algorithm

MA Hevia Fajardo, E Hemberg, J Toutouh… - Proceedings of the …, 2024 - dl.acm.org
Coevolutionary algorithms are helpful computational abstractions of adversarial behavior
and they demonstrate multiple ways that populations of competing adversaries influence …

A hybrid attack model for cyber-physical security assessment in electricity grid

YC Chen, T Gieseking, D Campbell… - 2019 IEEE Texas …, 2019 - ieeexplore.ieee.org
A detailed model of an attack on the power grid involves both a preparation stage as well as
an execution stage of the attack. This paper introduces a novel Hybrid Attack Model (HAM) …

SOCMTD: selecting optimal countermeasure for moving target defense using dynamic game

H Hu, J Liu, J Tan, J Liu - … on Internet and Information Systems (TIIS …, 2020 - koreascience.kr
Moving target defense, as a'game-changing'security technique for network warfare, realizes
proactive defense by increasing network dynamics, uncertainty and redundancy. How to …

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack‐Defense Game Model

J Tan, H Zhang, H Zhang, C Lei, H Jin… - Security and …, 2020 - Wiley Online Library
The centralized control characteristics of software‐defined networks (SDNs) make them
susceptible to advanced persistent threats (APTs). Moving target defense, as an effective …