Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK

@inproceedings{Shi2020DrainingTW,
  title={Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK},
  author={Zheyuan Ryan Shi and Aaron Schlenker and B. Hay and Daniel Bittleston and Siyu Gao and Emily Peterson and John Trezza and Fei Fang},
  booktitle={AAAI},
  year={2020}
}
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users. One clever technique, the ``watering hole'' attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment… Expand
AI for Social Good: Between My Research and the Real World

References

SHOWING 1-10 OF 32 REFERENCES
Deceiving Cyber Adversaries: A Game Theoretic Approach
Changing the game: The art of deceiving sophisticated attackers
Optimal Network Security Hardening Using Attack Graph Games
Advanced social engineering attacks
Deceiving Attackers by Creating a Virtual Attack Surface
A Security Game Model for Remote Software Protection
Optimal Personalized Filtering Against Spear-Phishing Attacks
Pareto-Optimal Adversarial Defense of Enterprise Systems
...
1
2
3
4
...