Title | ||
---|---|---|
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. |
Abstract | ||
---|---|---|
We study the problem of detecting data exfiltration in computer networks. We focus on the performance of optimal defense strategies with respect to an attacker’s knowledge about typical network behavior and his ability to influence the standard traffic. Internal attackers know the typical upload behavior of the compromised host and may be able to discontinue standard uploads in favor of the exfiltration. External attackers do not immediately know the behavior of the compromised host, but they can learn it from observations. |
Year | Venue | Field |
---|---|---|
2017 | GameSec | Computer security,Computer science,Upload,Network security,Game theory,Network behavior |
DocType | Citations | PageRank |
Conference | 2 | 0.39 |
References | Authors | |
13 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Karel Durkota | 1 | 40 | 4.85 |
Viliam Lisý | 2 | 219 | 26.66 |
Christopher Kiekintveld | 3 | 1179 | 94.94 |
Karel Horak | 4 | 17 | 5.72 |
Branislav Bosanský | 5 | 86 | 14.41 |
Tomáš Pevný | 6 | 1043 | 45.20 |