Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence

Jeffrey Pawlick and Quanyan Zhu Deception plays a critical role in many interactions in communication and network security. Game-theoretic models called “cheap talk signaling games” capture the dynamic and information asymmetric nature of deceptive interactions. But signaling games inherently model undetectable deception. In this paper, we investigate a model of signaling games in which the...

Post

Google ransomware tracking finds vicious infection cycle

Ransomware surged last year, becoming a multi-million dollar business that’s so profitable it’s creating a “vicious cycle” of ever-increasing attacks, say researchers at New York University [Tandon School of Engineering] and Google who tracked the criminals’ payment networks. … The findings suggest that even though the last two large ransomware attacks, Wannacry, and Petya, did...

Post

Google Warns Ransomware Boom Scored Crooks $2 Million A Month

As the ransomware scourge calms down for the summer holidays, Google has taken a retrospective at that particular pesky form of cybercrime, finding it only become massively profitable in the last year and a half. … Their success, and the sudden jump in revenue, is down to their distribution via botnets, in particular one known...

Post

MINIMAX GAME-THEORETIC APPROACH TO MULTISCALE H 1 OPTIMAL FILTERING

Hamza Anwar and Quanyan Zhu Sensing in complex systems requires large-scale information exchange and on-the-go communications over heterogeneous networks and integrated processing platforms. Many networked cyber-physical systems exhibit hierarchical infrastructures of information flows, which naturally leads to a multi-level tree-like information structure in which each level corresponds to a particular scale of representation. This work...

Post

A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery

Juntao Chen, Corinne Touati, Quanyan Zhu Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure and resilient networked system is essential for providing reliable and dependable services. To this end, we establish a two-player three-stage game framework to capture the dynamics in the infrastructure protection and recovery phases. Specifically, the goal...

Post

Optimal Secure Multi-Layer IoT Network Design

Juntao Chen, Corinne Touati, Quanyan Zhu With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally multi-layer with the cloud and cellular networks coexisting with the underlaid device-to-device...