scholarly journals Game Theory with Learning for Cyber Security Monitoring

Author(s):  
Keywhan Chung ◽  
Charles A. Kamhoua ◽  
Kevin A. Kwiat ◽  
Zbigniew T. Kalbarczyk ◽  
Ravishankar K. Iyer
2019 ◽  
Vol 155 ◽  
pp. 680-685 ◽  
Author(s):  
Vishruti Kakkad ◽  
Hitarth Shah ◽  
Reema Patel ◽  
Nishant Doshi

AI Magazine ◽  
2019 ◽  
Vol 40 (1) ◽  
pp. 49-62 ◽  
Author(s):  
Sunny Fugate ◽  
Kimberly Ferguson-Walter

Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In contrast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs about which systems contain critical information or are critical to a defender’s computing infrastructure. We introduce game theory concepts and models to represent and reason over the use of cyber deception by the defender and the effect it has on attacker perception. Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend the system using cyber deception. It is our opinion that adaptive cyber deception is a necessary component of future information systems and networks. The techniques we present can simultaneously decrease the risks and impacts suffered by defenders and dramatically increase the costs and risks of detection for attackers. Such techniques are likely to play a pivotal role in defending national and international security concerns.


2017 ◽  
Vol 50 (2) ◽  
pp. 1-37 ◽  
Author(s):  
Cuong T. Do ◽  
Nguyen H. Tran ◽  
Choongseon Hong ◽  
Charles A. Kamhoua ◽  
Kevin A. Kwiat ◽  
...  

2019 ◽  
Author(s):  
Alireza Zarreh ◽  
HungDa Wan ◽  
Yooneun Lee ◽  
Can Saygin ◽  
Rafid Al Janahi

This paper presents a novel approach using game theory to assess the risk likelihood in manufacturing systems quantifiably. Cybersecurity is a pressing issue in the manufacturing sector. Nevertheless, managing the risk in cybersecurity has become a critical challenge for modern manufacturing enterprises. In risk management thinking, the first step is to identify the risk, then validate it, and lastly, consider responses to the risk. If the risk is below the security risk appetite of the manufacturing system, it could be accepted. However, if it is above the risk appetite, the system should appropriately respond by either avoiding, transferring, or mitigating the risk. The validation of the risk in terms of severity and likelihood of the threat, however, is challenging because the later component is hard to quantify. In this paper, Failure Modes and Effects Analysis (FMEA) method is modified by employing game theory to quantitatively assess the likelihood of cyber-physical security risks. This method utilizes the game theory approach by modeling the rivalry between the attacker and the system as a game and then try to analyze it to find the likelihood of the attacker’s action. We first define players of the game, action sets, and the utility function. Major concerns of cyber security issues in the manufacturing area are carefully considered in defining the cost function composed of defense policy, loss in production, and recovery. A linear optimization model is utilized to find a mixed-strategy Nash Equilibrium, which is the probability of choosing any action by the attacker also known as the likelihood of an attack. Numerical experiments are presented to further illustrate the method. Forecasting the attacker’s behavior enables us to assess the cybersecurity risk in a manufacturing system and thereby be more prepared with plans of proper responses.


Author(s):  
Manjunath Kotari ◽  
Niranjan N. Chiplunkar

Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.


2018 ◽  
Vol 36 (4) ◽  
pp. 1271 ◽  
Author(s):  
D.A. Akinwumi ◽  
G.B. Iwasokun ◽  
B.K. Alese ◽  
S.A. Oluwadare

Sign in / Sign up

Export Citation Format

Share Document