File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

최진혁

Choi, Jin Hyuk
Mathematical Finance Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.startPage 113912 -
dc.citation.title DECISION SUPPORT SYSTEMS -
dc.citation.volume 166 -
dc.contributor.author Han, Kookyoung -
dc.contributor.author Choi, Jin Hyuk -
dc.contributor.author Choi, Yunsik -
dc.contributor.author Lee, Gene Moo -
dc.contributor.author Whinston, Andrew B. -
dc.date.accessioned 2023-12-21T12:50:19Z -
dc.date.available 2023-12-21T12:50:19Z -
dc.date.created 2023-01-03 -
dc.date.issued 2023-03 -
dc.description.abstract Modern cyberattacks such as advanced persistent threats have become sophisticated. Hackers can stay undetected for an extended time and defenders do not have sufficient countermeasures to prevent advanced cyberattacks. Reflecting on this phenomenon, we propose a game-theoretic model to analyze strategic decisions made by a hacker and a defender in equilibrium. In our game model, the hacker launches stealthy cyberattacks for a long time and the defender decides when to disable a suspicious user based on noisy observations of the user’s activities. Damages caused by the hacker can be enormous if the defender does not immediately ban a suspicious user under certain circumstances, which can explain the emerging sophisticated cyberattacks with detrimental consequences. Our model also predicts that the hacker may opt to be behavioral to avoid worst cases. This is because behavioral cyberattacks are less threatening and the defender decides not to immediately block a suspicious user to reduce cost of false detection. -
dc.identifier.bibliographicCitation DECISION SUPPORT SYSTEMS, v.166, pp.113912 -
dc.identifier.doi 10.1016/j.dss.2022.113912 -
dc.identifier.issn 0167-9236 -
dc.identifier.scopusid 2-s2.0-85144261939 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/61978 -
dc.identifier.wosid 000927094400001 -
dc.language 영어 -
dc.publisher Elsevier BV -
dc.title Security defense against long-term and stealthy cyberattacks -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Artificial Intelligence;Computer Science, Information Systems;Operations Research & Management Science -
dc.relation.journalResearchArea Computer Science;Operations Research & Management Science -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Dynamic game -
dc.subject.keywordAuthor False detection -
dc.subject.keywordAuthor Persistent threats -
dc.subject.keywordAuthor Security automation -
dc.subject.keywordAuthor Stealthy cyberattacks -
dc.subject.keywordPlus INFORMATION SECURITY -
dc.subject.keywordPlus RISK -
dc.subject.keywordPlus SERVICES -
dc.subject.keywordPlus SYSTEMS -
dc.subject.keywordPlus IMPACT -
dc.subject.keywordPlus COMPETITION -
dc.subject.keywordPlus MARKETS -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.