SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game |
Hu, Hao
(State Key Laboratory of Mathematical Engineering and Advanced Computing)
Liu, Jing (State Key Laboratory of Mathematical Engineering and Advanced Computing) Tan, Jinglei (State Key Laboratory of Mathematical Engineering and Advanced Computing) Liu, Jiang (State Key Laboratory of Mathematical Engineering and Advanced Computing) |
1 | Alshamrani A, Myneni S, Chowdhary Ankur, et al., "A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities," IEEE Communications Surveys and Tutorials, 21(2), 1851-1877, 2019. DOI |
2 | Chen C, Hu J, Qiu T, et al., "CVCG: Cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks," IEEE Transactions on Mobile Computing, 18(12), 2811-2828, 2019. DOI |
3 | Chen C, Liu L, Qiu T, et al., "ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks," IEEE Transactions on Intelligent Transportation Systems, 20(5), 1604-1620, 2019. DOI |
4 | Sengupta S, Chowdhary A, Sabur A, et al., "A survey of moving target defenses for network security," arXiv: Cryptography and Security, 2019. |
5 | Song F, Zhou Y T, Wang Y, et al., "Smart collaborative distribution for privacy enhancement in moving target defense," Information Sciences, 479, 593-606, 2019. DOI |
6 | Zhuang R, Deloach S A, Ou X, "Towards a theory of moving target defense," in Proc. of the First ACM Workshop on Moving Target Defense, pp. 31-40, 2014. |
7 | Cho J H, Sharma D P, Alavizadeh H, et al., "Toward proactive, adaptive defense: A survey on moving target defense," IEEE Communications Surveys & Tutorials, 22(1), 709-745, 2020. DOI |
8 | Pan K, Palensky P, Esfahani P M, "From static to dynamic anomaly detection with application to power system cyber security," IEEE Transactions on Power Systems, 35(2), 1584-1596, 2020. DOI |
9 | Hu H, Liu Y, Zhang H, et al., "Optimal network defense strategy selection based on incomplete information evolutionary game," IEEE Access, 6, 29806-29821, 2018. DOI |
10 | Hu H, Liu Y, Chen C, et al., "Optimal decision making approach for cyber security defense using evolutionary game," IEEE Transactions on Network and Service Management, 17(3), 1683-1700, 2020. DOI |
11 | Zimba A, Chen H, Wang Z, "Bayesian network based weighted APT attack paths modeling in cloud computing," Future Generation Computer Systems, 96, 525-537, 2019. DOI |
12 | Jha S, Sheyner O, and Wing J, "Two formal analyses of attack graphs," in Proc. of the 15th IEEE Workshop on Computer Security Foundations, 49-63, 2002. |
13 | Poolsappasit N, Dewri R, and Ray I, "Dynamic security risk management using Bayesian attack graphs," IEEE Transaction on Dependable and Secure Computing, 9(1), 61-74, 2012. DOI |
14 | Chen X J, Shi J Q, Xu F, "Algorithm of optimal security hardening measures against insider threat," Chinese Journal of Computer Research and Development, 51(7), 1565-1577, 2014. |
15 | Lye K W and Wing J M, "Game strategies in network security," International Journal of Information Security, 4(1), 71-86, 2005. DOI |
16 | Jiang W, Fang B, Tian Z H, et al., "Evaluating network security and optimal active defense based on attack-defense game model," Chinese Journal of Computers, 32(4), 817-827, 2009. DOI |
17 | Jiang W, Fang B, Tian Z H, et al., "Research on defense strategies selection based on attack-defense stochastic game model," Chinese Journal of Computer Research and Development, 47(10), 1714-1723, 2010. |
18 | Tan J, Lei C, Zhang H, et al., "Optimal strategy selection approach to moving target defense based on Markov robust game," Computers & Security, 8(5), 63-76, 2019. |
19 | Manadhata P K, "Game theoretic approaches to attack surface shifting," Moving Target Defense II, pp. 1-13, 2012. |
20 | Colbaugh R and Glass K, "Predictability-oriented defense against adaptive adversaries," in Proc. of the IEEE International Conference on Systems, Man, and Cybernetics, 2721-2727, 2012. |
21 | Zhu Q and Basar T, "Game-theoretic approach to feedback-driven multi-stage moving target defense," Decision and Game Theory for Security, 246-263, 2013. |
22 | Carter K M, Riordan J F, and Okhravi H, "A game theoretic approach to strategy determination for dynamic platform defenses," in Proc. of the First ACM Workshop on Moving Target Defense, 21-30, 2014. |
23 | Winterrose1 M L, Carter1 K M, Wagner N, et al., "Adaptive attacker strategy development against moving target cyber defenses," Advances in Cyber Security Analytics and Decision Systems, pp 1-14, 2020. |
24 | Prakash A and Wellman M P, "Empirical game-theoretic analysis for moving target defense," in Proc. of the Second ACM Workshop on Moving Target Defense, 57-65, 2015. |
25 | Jones S, Outkin A, Gearhart J, et al., Evaluating moving target defense with PLADD, Sandia National Laboratories, United States, 2015. |
26 | Vadlamudi S G, Sengupta S, Taguinod M, et al., "Moving target defense for web applications using Bayesian stackelberg games," in Proc. of the 15th International Conference on Autonomous Agents and Multiagent Systems, 1377-1378, 2016. |
27 | Maleki H, Valizadeh S, Koch W, et al., "Markov modeling of moving target defense games," in Proc. of the 2016 ACM Workshop on Moving Target Defense, 81-92, 2016. |