Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

@inproceedings{Laszka2013MitigatingCC,
  title={Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks},
  author={Aron Laszka and Benjamin Johnson and Jens Grossklags},
  booktitle={WINE},
  year={2013}
}
Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more value over a longer period of time. These covert attacks come in multiple varieties, which can be categorized into two main types: targeted and non-targeted attacks. Targeted attacks include, for example, cyberespionage, while non-targeted attacks include botnet recruitment. We are concerned with the subclass of these attacks for which detection is too costly or… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 18 extracted citations

Similar Papers

Loading similar papers…