Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Ahmed H. Anwar"'
Publikováno v:
IEEE Transactions on Network and Service Management. 19:3438-3452
Publikováno v:
IEEE Transactions on Network and Service Management. 19:112-129
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consisten
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031263682
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c6dc0bd6146a3a7f5822a1ad4c6b9bc
https://doi.org/10.1007/978-3-031-26369-9_3
https://doi.org/10.1007/978-3-031-26369-9_3
Autor:
Olivier Tsemogne, Willie Kouam, Ahmed H. Anwar, Yezekael Hayel, Charles Kamhoua, Gabriel Deugoué
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031263682
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0fb4a463aa67a422dc0cb12a59fc5c07
https://doi.org/10.1007/978-3-031-26369-9_13
https://doi.org/10.1007/978-3-031-26369-9_13
Publikováno v:
GLOBECOM 2022 - 2022 IEEE Global Communications Conference.
Publikováno v:
Game Theory and Machine Learning for Cyber Security
In this chapter, we introduce a cyber deception defense approach and propose a scalable allocation algorithm to place honeypots over an attack graph. We formulate a two‐person zero‐sum strategic game between the network defender and an attacker.
Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception
Autor:
Marcus Gutierrez, Anjon Basak, Sridhar Venkatesan, Christopher Kiekintveld, Ahmed H. Anwar, Charles A. Kamhoua
Publikováno v:
Game Theory and Machine Learning for Cyber Security
Identifying an attacker in as much detail as possible (e.g., what their goals, capabilities, and tactics are) can lead to better defensive strategies for the defender and may eventually help with the attribution of attacks. On the other hand, attacke
Publikováno v:
IEEE Transactions on Cloud Computing. 9:854-867
In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocated on the same physical machine to optimize performance, power consumption and maximize profit. This, however, increases the risk of a malicious VM performing side-channel attack
Publikováno v:
IEEE Communications Surveys & Tutorials. 23:2460-2493
Defensive deception is a promising approach for cyber defense. Via defensive deception, a defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding some of its resources. Although defensive deception is garnering incr
Autor:
Ahmed H. Anwar, Charles A. Kamhoua
Publikováno v:
2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC).