A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy

J Pawlick, E Colbert, Q Zhu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Deception techniques in computer security: A research perspective

X Han, N Kheir, D Balzarotti - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
A recent trend both in academia and industry is to explore the use of deception techniques
to achieve proactive attack detection and defense—to the point of marketing intrusion …

Dynamic games in cyber-physical security: An overview

SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …

HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles

S Panda, S Rass, S Moschoyiannis, K Liang… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …

Game theory for adaptive defensive cyber deception

K Ferguson-Walter, S Fugate, J Mauger… - Proceedings of the 6th …, 2019 - dl.acm.org
As infamous hacker Kevin Mitnick describes in his book The Art of Deception," the human
factor is truly security's weakest link"[18]. Deception has been widely successful when used …

Honeypot allocation over attack graphs in cyber deception games

AH Anwar, C Kamhoua, N Leslie - … International Conference on …, 2020 - ieeexplore.ieee.org
In this paper, we propose a scalable algorithm to allocate honeypots over an attack graph.
We formulate a two-person zero-sum strategic game between the network defender and an …

Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack

A Mairaj, AY Javaid - Computer networks, 2022 - Elsevier
Game theory is being used in cybersecurity to observe different attacks as it can provide a
mathematical representation of the interactions between system admins, hackers, and users …

Game theoretic honeypot deployment in smart grid

P Diamantoulakis, C Dalamagkas… - Sensors, 2020 - mdpi.com
The smart grid provides advanced functionalities, including real-time monitoring, dynamic
energy management, advanced pricing mechanisms, and self-healing, by enabling the two …