AI Strategy and Concepts Bibliography

WIKINDX Resources

Fugate, S., & Ferguson-Walter, K. (2019). Artificial intelligence and game theory models for defending critical networks with cyber deception. AI Magazine, 40(1), 49–62. 
Added by: SijanLibrarian (2020-10-28 13:47:52)   Last edited by: SijanLibrarian (2020-10-28 13:50:29)
Resource type: Journal Article
BibTeX citation key: Fugate2019
Email resource to friend
View all bibliographic details
Categories: Artificial Intelligence, Computer Science, Decision Theory, General, Innovation, Mathematics, Military Science
Subcategories: Cognitive Electronic Warfare, Command and control, Cyber, Deep learning, Doctrine, Game theory, JADC2, Machine learning, Machine recognition, Markov models, Mosaic warfare, Networked forces, Neural nets, Q-learning, Strategy
Creators: Ferguson-Walter, Fugate
Collection: AI Magazine
Views: 36/49
Views index: 13%
Popularity index: 3.25%
Abstract

Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In con- trast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs about which systems contain critical information or are critical to a defender’s computing infrastructure. We introduce game theory concepts and models to represent and reason over the use of cyber deception by the defender and the effect it has on attacker percep- tion. Finally, we discuss techniques for combining artificial intelligence algo- rithms with game theory models to esti- mate hidden states of the attacker using feedback through payoffs to learn how best to defend the system using cyber deception. It is our opinion that adap- tive cyber deception is a necessary com- ponent of future information systems and networks. The techniques we pres- ent can simultaneously decrease the risks and impacts suffered by defenders and dramatically increase the costs and risks of detection for attackers. Such techniques are likely to play a pivotal role in defending national and interna- tional security concerns.


  
wikindx 6.2.2 ©2003-2020 | Total resources: 1447 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA) | Database queries: 67 | DB execution: 0.25822 secs | Script execution: 0.27288 secs