Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis

M Wright, S Venkatesan, M Albanese, and MP Wellman Third ACM Workshop on Moving Target Defense, Oct 2016. Abstract Distributed denial-of-service attacks are a rampant problem facing web applications, for which many defense techniques have…

Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense

Principal Investigators Michael Wellman (U Michigan) Satinder Singh (U Michigan) Demosthenis Teneketzis (U Michigan) PIs at partner universities: Sushil Jajodia (George Mason U) [Project Director] George Cybenko (Dartmouth…

Gradient Methods for Stackelberg Security Games

K Amin, S Singh, and MP Wellman Conference on Uncertainty in Artificial Intelligence, June 2016. Abstract Stackelberg games are two-stage games in which the first player (called the leader) commits to a strategy, after which the other…

Empirical Game-Theoretic Analysis for Moving Target Defense

A Prakash and MP Wellman Second ACM Workshop on Moving Target Defense, Oct 2015. Abstract The effectiveness of a moving target defense depends on how it is deployed through specific system operations over time, and how attackers may respond…

Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)

MP Wellman and A Prakash Fifth Conference on Decision and Game Theory for Security, Nov 2014. This report is superseded by a follow-on paper presented at the 2015 MTD workshop. Abstract We investigate an adaptive cyber-defense scenario,…

Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing

MP Wellman, TH Kim, and Q Duong Presented at the 12th Workshop on the Economics of Information Security, June 2013. Abstract Formal analyses of incentives for compliance with network protocols often appeal to game-theoretic models and…

Incentivizing responsible networking via introduction-based routing

G Frazier, Q Duong, MP Wellman, and E Petersen Fourth International Conference on Trust and Trustworthy Computing, June 2011. Proceedings published as McCune et al. (eds.), Lecture Notes in Computer Science #6740, Springer. Abstract The…

Strategic Modeling of Information Sharing Among Data Privacy Attackers

Q Duong, K LeFevre, and MP Wellman Informatica 34:151-158, 2010. Original version presented at the IJCAI-09 Workshop on Quantitative Risk Analysis for Security Applications. Abstract Research in privacy-preserving data publishing has revealed…