Research Article

A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice

Table 1

Research on modeling deception defense by game theory.

AuthorFocus of the study

Çeker et al. [16]Modeled with a similar approach that uses game theory and provides the option of disguising a real system as a honeypot (or vice versa) to mitigate denial of service (DoS) attacks
Hichem et al. [17]Proposed a game theoretic technique to activate anomaly detection technique only when a new attack’s signature is expected to occur
Aaron et al. [18]To increase the uncertainty of adversarial reconnaissance and introduced a novel game theoretic model of deceptive interactions between a defender and a cyber-attacker into responses to network scans or reconnaissance
Somdip [19]Proposed a methodology in which game theory can be used to model the activity of stakeholders in the networks to detect anomalies such as collusion by using a supervised machine learning algorithm and algorithmic game theory
Pawlick and Zhu [20]Investigated a model of signaling games in which the receiver can detect deception with a specified probability
Kun et al. [21]Employed Nash equilibrium in the noncooperative game model and analyzes its efficiency in vehicular ad hoc networks