首页> 外文期刊>ACM Computing Surveys >A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
【24h】

A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

机译:一个游戏 - 理论分类和网络安全和隐私的防守欺骗调查

获取原文
获取原文并翻译 | 示例

摘要

Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this article, we survey 24 articles from 2008 to 2018 that use game theory to model defensive deception for cybersecurity and privacy. Then, we propose a taxonomy that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement. These types are delineated by their information structures, agents, actions, and duration: precisely concepts captured by game theory. Our aims are to rigorously define types of defensive deception, to capture a snapshot of the state of the literature, to provide a menu of models that can be used for applied research, and to identify promising areas for future work. Our taxonomy provides a systematic foundation for understanding different types of defensive deception commonly encountered in cybersecurity and privacy.
机译:两个数据库和关键基础设施上的网络攻击威胁公共和私营部门。无处不在的追踪和可穿戴计算机侵犯隐私。最近提出了使用防御性欺骗的倡导者和工程师作为利用攻击者通常享有的信息不对称作为防守者的工具的手段。然而,谨慎欺骗已经广泛和含有各种含义。在本文中,我们从2008年至2018年调查了24篇文章,使用博弈论模拟防御欺骗网络安全和隐私。然后,我们提出了一个分类学,定义六种类型的欺骗:扰动,移动目标防御,混淆,混合,蜂蜜X和攻击者参与。这些类型由他们的信息结构,代理,行动和持续时间划算:博弈论捕获的概念。我们的目标是严格定义防御性欺骗类型,以捕获文献状态的快照,以提供可用于应用研究的模型菜单,并确定未来工作的有希望的领域。我们的分类系统为理解不同类型的防御性欺骗提供了一个系统的基础,通常遇到网络安全和隐私。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号