Zobrazeno 1 - 10
of 196
pro vyhledávání: '"Kamhoua, Charles A."'
In many security applications of cyber-physical systems, a system designer must guarantee that critical missions are satisfied against attacks in the sensors and actuators of the CPS. Traditional security design of CPSs often assume that attackers ha
Externí odkaz:
http://arxiv.org/abs/2412.01975
Deception plays a crucial role in strategic interactions with incomplete information. Motivated by security applications, we study a class of two-player turn-based deterministic games with one-sided incomplete information, in which player 1 (P1) aims
Externí odkaz:
http://arxiv.org/abs/2407.14436
This paper introduces a novel approach, Decision Theory-guided Deep Reinforcement Learning (DT-guided DRL), to address the inherent cold start problem in DRL. By integrating decision theory principles, DT-guided DRL enhances agents' initial performan
Externí odkaz:
http://arxiv.org/abs/2402.06023
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic placement of honeypots in networks should consider not only network aspec
Externí odkaz:
http://arxiv.org/abs/2308.11817
Autor:
Sayed, Md Abu, Anwar, Ahmed H., Kiekintveld, Christopher, Bosansky, Branislav, Kamhoua, Charles
Publikováno v:
International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepr
Externí odkaz:
http://arxiv.org/abs/2307.13107
Over the years, honeypots emerged as an important security tool to understand attacker intent and deceive attackers to spend time and resources. Recently, honeypots are being deployed for Internet of things (IoT) devices to lure attackers, and learn
Externí odkaz:
http://arxiv.org/abs/2305.00925
This paper is concerned with the optimal allocation of detection resources (sensors) to mitigate multi-stage attacks, in the presence of the defender's uncertainty in the attacker's intention. We model the attack planning problem using a Markov decis
Externí odkaz:
http://arxiv.org/abs/2304.05962
Autor:
Mfogo, Volviane Saphir, Zemkoho, Alain, Njilla, Laurent, Nkenlifack, Marcellin, Kamhoua, Charles
The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices in order to address them before a
Externí odkaz:
http://arxiv.org/abs/2303.12367
This paper investigates the problem of synthesizing proactive defense systems in which the defender can allocate deceptive targets and modify the cost of actions for the attacker who aims to compromise security assets in this system. We model the int
Externí odkaz:
http://arxiv.org/abs/2301.01336