메뉴 건너뛰기




Volumn 35, Issue 3, 2017, Pages 534-544

Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study

Author keywords

advanced persistent threats; Cloud storage; game theory; prospect theory; Q learning

Indexed keywords

NETWORK SECURITY; VIRTUAL STORAGE;

EID: 85018864378     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2017.2659418     Document Type: Article
Times cited : (97)

References (25)
  • 2
    • 80052169144 scopus 로고    scopus 로고
    • Advanced persistent threats and how to monitor and deter them
    • Aug.
    • C. Tankard, "Advanced persistent threats and how to monitor and deter them, " Netw. Secur., vol. 2011, no. 8, pp. 16-19, Aug. 2011.
    • (2011) Netw. Secur. , vol.2011 , Issue.8 , pp. 16-19
    • Tankard, C.1
  • 3
    • 84890434312 scopus 로고    scopus 로고
    • FlipIt: The game of 'stealthy takeover
    • Oct.
    • M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, "FlipIt: The game of 'stealthy takeover, "' J. Cryptol., vol. 26, no. 4, pp. 655-713, Oct. 2013.
    • (2013) J. Cryptol. , vol.26 , Issue.4 , pp. 655-713
    • Van Dijk, M.1    Juels, A.2    Oprea, A.3    Rivest, R.L.4
  • 4
    • 0000125532 scopus 로고
    • Prospect theory: An analysis of decision under risk
    • D. Kahneman and A. Tversky, "Prospect theory: An analysis of decision under risk, " Econ., J. Econ. Soc., vol. 47, no. 2, pp. 263-291, 1979.
    • (1979) Econ., J. Econ. Soc. , vol.47 , Issue.2 , pp. 263-291
    • Kahneman, D.1    Tversky, A.2
  • 5
    • 31744450082 scopus 로고
    • Advances in prospect theory: Cumulative representation of uncertainty
    • A. Tversky and D. Kahneman, "Advances in prospect theory: Cumulative representation of uncertainty, " J. Risk Uncertainty, vol. 5, no. 4, pp. 297-323, 1992.
    • (1992) J. Risk Uncertainty , vol.5 , Issue.4 , pp. 297-323
    • Tversky, A.1    Kahneman, D.2
  • 6
    • 84979466856 scopus 로고    scopus 로고
    • Toward a consumer-centric grid: A behavioral perspective
    • Apr.
    • W. Saad, A. L. Glass, N. B. Mandayam, H. V. Poor, "Toward a consumer-centric grid: A behavioral perspective, " Proc. IEEE, vol. 104, no. 4, pp. 865-882, Apr. 2016.
    • (2016) Proc. IEEE , vol.104 , Issue.4 , pp. 865-882
    • Saad, W.1    Glass, A.L.2    Mandayam, N.B.3    Poor, H.V.4
  • 7
    • 77953364289 scopus 로고    scopus 로고
    • Adaptive route choices in risky traffic networks: A prospect theory approach
    • Oct.
    • S. Gao, E. Frejinger, M. Ben-Akiva, "Adaptive route choices in risky traffic networks: A prospect theory approach, " Transp. Res. C, Emerg. Technol., vol. 18, no. 5, pp. 727-740, Oct. 2010.
    • (2010) Transp. Res. C, Emerg. Technol. , vol.18 , Issue.5 , pp. 727-740
    • Gao, S.1    Frejinger, E.2    Ben-Akiva, M.3
  • 8
    • 67349117277 scopus 로고    scopus 로고
    • Expected utility theory and prospect theory: One wedding and a decent funeral
    • Jun.
    • G. W. Harrison and E. E. Rutström, "Expected utility theory and prospect theory: One wedding and a decent funeral, " Experim. Econ., vol. 12, no. 2, pp. 133-158, Jun. 2009.
    • (2009) Experim. Econ. , vol.12 , Issue.2 , pp. 133-158
    • Harrison, G.W.1    Rutström, E.E.2
  • 10
    • 84899975547 scopus 로고    scopus 로고
    • When users interfere with protocols: Prospect theory in wireless networks using random access and data pricing as an example
    • Apr.
    • T. Li and N. B. Mandayam, "When users interfere with protocols: Prospect theory in wireless networks using random access and data pricing as an example, " IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 1888-1907, Apr. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.4 , pp. 1888-1907
    • Li, T.1    Mandayam, N.B.2
  • 16
    • 84919882605 scopus 로고    scopus 로고
    • Prospect theoretic analysis of energy exchange among microgrids
    • Jan.
    • L. Xiao, N. B. Mandayam, H. V. Poor, "Prospect theoretic analysis of energy exchange among microgrids, " IEEE Trans. Smart Grid, vol. 6, no. 1, pp. 63-72, Jan. 2015.
    • (2015) IEEE Trans. Smart Grid , vol.6 , Issue.1 , pp. 63-72
    • Xiao, L.1    Mandayam, N.B.2    Poor, H.V.3
  • 18
    • 0001750296 scopus 로고    scopus 로고
    • The probability weighting function
    • May
    • D. Prelec, "The probability weighting function, " Econometrica, vol. 66, no. 3, pp. 497-527, May 1998.
    • (1998) Econometrica , vol.66 , Issue.3 , pp. 497-527
    • Prelec, D.1
  • 20
    • 84953209535 scopus 로고    scopus 로고
    • Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats
    • Berlin, Germany: Springer, Nov.
    • J. Pawlick, S. Farhang, Q. Zhu, "Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats, " in Decision Game Theory for Security, vol. 9406. Berlin, Germany: Springer, Nov. 2015, pp. 289-308.
    • (2015) Decision Game Theory for Security , vol.9406 , pp. 289-308
    • Pawlick, J.1    Farhang, S.2    Zhu, Q.3
  • 21
    • 85027261691 scopus 로고    scopus 로고
    • A game theoretic model for defending against stealthy attacks with limited resources
    • Berlin, Germany: Springer, Nov.
    • M. Zhang, Z. Zheng, N. B. Shroff, "A game theoretic model for defending against stealthy attacks with limited resources, " in Decision Game Theory for Security, vol. 940. Berlin, Germany: Springer, Nov. 2015, pp. 93-112.
    • (2015) Decision Game Theory for Security , vol.940 , pp. 93-112
    • Zhang, M.1    Zheng, Z.2    Shroff, N.B.3
  • 22
    • 84954235490 scopus 로고    scopus 로고
    • Dynamic defense strategy against advanced persistent threat with insiders
    • Hong Kong, China, May
    • P. Hu, H. Li, H. Fu, D. Cansever, P. Mohapatra, "Dynamic defense strategy against advanced persistent threat with insiders, " in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Hong Kong, China, May 2015, pp. 747-755.
    • (2015) Proc. IEEE Conf. Comput. Commun. (INFOCOM) , pp. 747-755
    • Hu, P.1    Li, H.2    Fu, H.3    Cansever, D.4    Mohapatra, P.5
  • 23
    • 84959202314 scopus 로고    scopus 로고
    • User-centric view of jamming games in cognitive radio networks
    • Dec.
    • L. Xiao, J. Liu, Q. Li, N. B. Mandayam, H. V. Poor, "User-centric view of jamming games in cognitive radio networks, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.12 , pp. 2578-2590
    • Xiao, L.1    Liu, J.2    Li, Q.3    Mandayam, N.B.4    Poor, H.V.5
  • 24
    • 84986182441 scopus 로고    scopus 로고
    • A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning
    • Mar.
    • Y. Han, T. Alpcan, J. Chan, C. Leckie, B. I. P. Rubinstein, "A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 556-570, Mar. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.3 , pp. 556-570
    • Han, Y.1    Alpcan, T.2    Chan, J.3    Leckie, C.4    Rubinstein, B.I.P.5
  • 25
    • 85015372718 scopus 로고    scopus 로고
    • Prospect theoretic study of cloud storage defense against advanced persistent threats
    • Washington, DC, USA, Dec.
    • D. Xu, Y. Li, L. Xiao, N. B. Mandayam, H. V. Poor, "Prospect theoretic study of cloud storage defense against advanced persistent threats, " in Proc. IEEE Global Commun. Conf., Washington, DC, USA, Dec. 2016, pp. 1-6.
    • (2016) Proc. IEEE Global Commun. Conf. , pp. 1-6
    • Xu, D.1    Li, Y.2    Xiao, L.3    Mandayam, N.B.4    Poor, H.V.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.