@inproceedings{32c882df4fd14531af5942cbb61327c0,
title = "Cyber security via signaling games: Toward a science of cyber security",
abstract = "In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker quickly escalated to a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The record breaking Spamhaus/Cyberbunker conflict arose 13 years after the publication of best practices on preventing DDoS attacks, and it was not an isolated event. Recently, NYU's Courant Institute and Carnegie Mellon Software Engineering Institute have collaboratively devised a game-theoretic approaches to address various cyber security problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.",
author = "William Casey and Morales, {Jose A.} and Thomson Nguyen and Jonathan Spring and Rhiannon Weaver and Evan Wright and Leigh Metcalf and Bud Mishra",
year = "2014",
doi = "10.1007/978-3-319-04483-5_4",
language = "English (US)",
isbn = "9783319044828",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "34--42",
booktitle = "Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Proceedings",
note = "10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014 ; Conference date: 06-02-2014 Through 09-02-2014",
}