scholarly journals A Comprehensive Attack and Defense Model for the Automotive Domain

Author(s):  
Thomas Hutzelmann ◽  
Sebastian Banescu ◽  
Alexander Pretschner
Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


2020 ◽  
Vol 17 (3) ◽  
pp. 227-234 ◽  
Author(s):  
Nicola Dimitri

In this paper, we consider a simple two-player attack and defense model, focusing on the role of players’ abilities and choice timing. Abilities are divided into skills and efficiency, where the former is an absolute notion and the latter a relative notion of ability. Timing is investigated by comparing players’ investments in a simultaneous and a Stackelberg game. In the simultaneous game, the Nash Equilibrium investment level in attack and defense resources is symmetric, increasing in the skills but non-monotonic in the relative efficiency. In the Stackelberg game, the equilibrium investment levels are asymmetric, increasing in the skills, but with their ranking affected only by the relative efficiency. Therefore, interestingly, players’ choice is mostly characterized by players’ relative efficiency rather than by their skills, in regards to timing.


2019 ◽  
Vol 1302 ◽  
pp. 022068
Author(s):  
Xiaolin Zhao ◽  
Jiong Guo ◽  
Xiaoyi Jiang ◽  
Jingjing Zhao ◽  
Hao Xu

Author(s):  
М.А. Мусаева

Сформулирована игровая модель противоборства в виде модели "нападение и защита", указаны способы вычисления ресурсов сторон, анализированы эффективность их стратегий и установлены условия существования оптимального решения рассматриваемых задач. A game model of confrontation is formulated in the form of an attack and defense model, methods for calculating the resources of the confrontation parties are discussed, their efficiency is analyzed, and the existence conditions are given for an optimal solution to the considering problems.


2020 ◽  
Author(s):  
Tam ngoc Nguyen

We proposes a new scientific model that enables the ability to collect evidence, and explain the motivations behind people's cyber malicious/ethical behaviors. Existing models mainly focus on detecting already-committed actions and associated response strategies, which is not proactive. That is the reason why little has been done in order to prevent malicious behaviors early, despite the fact that issues like insider threats cost corporations billions of dollars annually, and its time to detection often lasts for more than a year.We address those problems by our main contributions of:+ A better model for ethical/malicious behavioral analysis with a strong focus on understanding people's motivations. + Research results regarding ethical behaviors of more than 200 participants, during the historic Covid-19 pandemic. + Novel attack and defense strategies based on validated model and survey results. + Strategies for continuous model development and integration, utilizing latest technologies such as natural language processing, and machine learning. We employed mixed-mode research approach of: integrating and combining proven behavioral science models, case studying of hackers, survey research, quantitative analysis, and qualitative analysis. For practical deployments, corporations may utilize our model in: improving HR processes and research, prioritizing plans based on the model's informed human behavioral metrics, better analysis in existing or potential cyber insider threat cases, generating more defense tactics in information warfare and so on.


1986 ◽  
Author(s):  
Jerome Bracken ◽  
James E. Falk ◽  
A. J. Tai ◽  
Richard M. Soland
Keyword(s):  

Author(s):  
Prashanth AS ◽  
Praveenkumar H Bagali

In the process of evolution from quadrupeds to bipeds, the forelimbs developed into upper limbs. In quadrupeds they serve the purpose of weight bearing and attack. In bipeds they serve fine functions, holding an object, attack and defense. It has been estimated by research group that the hand performs approximately thousand different functions in an ordinary day today’s activity. Apabahuka is one such disease which hampers most of the foresaid functions of the hand. Although any of the classics do not mention about the Shoola as a Laxana of Apabahuka, it still is a feature practically seen in Avabahuka patients. Chikitsa Sara Sangraha and Nidana Sara, clearly mentions about Svedana as a predominant Laxana of Avabahuka, along with other Laxana. It is often said that ‘the pain is often severe enough to disturb the sleep’. Amsa Marma is primarily involved in Avabahuka, it is a Snayu Marma and one of Vaikalyakara Marma, any trauma to this will produce disability or deformity of the shoulder joint. Management of pain is facilitated by Marma Chikitsa i.e. Nidana Parivarjana, Abhyanga, Swedana, Uttarabhaktika Snehapana, Vata Hara Oushadha Sevana, Marmabhighata Chikitsa, Brumhana, Nasya, Lepa, Seka, Nasya, Nasaapaana, Agnikarma, Siravyadha, etc.


Sign in / Sign up

Export Citation Format

Share Document