A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks
暂无分享,去创建一个
Demosthenis Teneketzis | Erik Miehling | Mohammad Rasouli | D. Teneketzis | Erik Miehling | M. Rasouli
[1] Nora Cuppens-Boulahia,et al. A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.
[2] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[3] George Varghese,et al. Intrusion Response Systems: A Survey , 2008 .
[4] Karl Johan Åström,et al. Optimal control of Markov processes with incomplete state information , 1965 .
[5] Sherif Abdelwahed,et al. High-Performance Intrusion Response Planning on Many-Core Architectures , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[6] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[7] Yu Liu,et al. Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.
[8] William H. Sanders,et al. Ieee Transactions on Parallel and Distributed Systems Rre: a Game-theoretic Intrusion Response and Recovery Engine , 2022 .
[9] Michel Dagenais,et al. Intrusion Response Systems: Survey and Taxonomy , 2012 .
[10] Sherif Abdelwahed,et al. A Probabilistic Approach to Autonomic Security Management , 2016, 2016 IEEE International Conference on Autonomic Computing (ICAC).
[11] Nor Badrul Anuar,et al. Intrusion response systems: Foundations, design, and challenges , 2016, J. Netw. Comput. Appl..
[12] O. Patrick Kreidl,et al. Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.
[13] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[15] Christopher Krügel,et al. Evaluating the impact of automated intrusion response mechanisms , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[16] Karl N. Levitt,et al. Using Specification-Based Intrusion Detection for Automated Response , 2003, RAID.
[17] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[18] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[19] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[20] Joelle Pineau,et al. Online Planning Algorithms for POMDPs , 2008, J. Artif. Intell. Res..
[21] Michael P. Wellman,et al. Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis , 2017, MTD@CCS.
[22] Udo W. Pooch,et al. Adaptation techniques for intrusion detection and intrusion response systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[23] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[24] L.M. Rossey,et al. SARA: Survivable Autonomic Response Architecture , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[25] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[26] Demosthenis Teneketzis,et al. A dependency graph formalism for the dynamic defense of cyber networks , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[27] David Hsu,et al. SARSOP: Efficient Point-Based POMDP Planning by Approximating Optimally Reachable Belief Spaces , 2008, Robotics: Science and Systems.
[28] Yi Ouyang,et al. Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition , 2015, IEEE Transactions on Automatic Control.
[29] Eugene H. Spafford,et al. ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[30] Demosthenis Teneketzis,et al. Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.
[31] Joel Veness,et al. Monte-Carlo Planning in Large POMDPs , 2010, NIPS.
[32] Pravin Varaiya,et al. Stochastic Systems: Estimation, Identification, and Adaptive Control , 1986 .