Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis
M Wright, S Venkatesan, M Albanese, and MP Wellman
Third ACM Workshop on Moving Target Defense, Oct 2016.
Abstract
Distributed denial-of-service attacks are a rampant problem facing web applications, for which many defense techniques have…
Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense
Principal Investigators
Michael Wellman (U Michigan)
Satinder Singh (U Michigan)
Demosthenis Teneketzis (U Michigan)
PIs at partner universities:
Sushil Jajodia (George Mason U) [Project Director]
George Cybenko (Dartmouth…
Gradient Methods for Stackelberg Security Games
K Amin, S Singh, and MP Wellman
Conference on Uncertainty in Artificial Intelligence, June 2016.
Abstract
Stackelberg games are two-stage games in which the first player (called the leader) commits to a strategy, after which the other…
Empirical Game-Theoretic Analysis for Moving Target Defense
A Prakash and MP Wellman
Second ACM Workshop on Moving Target Defense, Oct 2015.
Abstract
The effectiveness of a moving target defense depends on how it is deployed through specific system operations over time, and how attackers may respond…
Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
MP Wellman and A Prakash
Fifth Conference on Decision and Game Theory for Security, Nov 2014.
This report is superseded by a follow-on paper presented at the 2015 MTD workshop.
Abstract
We investigate an adaptive cyber-defense scenario,…
Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing
MP Wellman, TH Kim, and Q Duong
Presented at the 12th Workshop on the Economics of Information Security, June 2013.
Abstract
Formal analyses of incentives for compliance with network protocols often appeal to game-theoretic models and…
Incentivizing responsible networking via introduction-based routing
G Frazier, Q Duong, MP Wellman, and E Petersen
Fourth International Conference on Trust and Trustworthy Computing, June 2011.
Proceedings published as McCune et al. (eds.), Lecture Notes in Computer Science #6740, Springer.
Abstract
The…
Strategic Modeling of Information Sharing Among Data Privacy Attackers
Q Duong, K LeFevre, and MP Wellman
Informatica 34:151-158, 2010.
Original version presented at the IJCAI-09 Workshop on Quantitative Risk Analysis for Security Applications.
Abstract
Research in privacy-preserving data publishing has revealed…