A Learning-Based Approach to Reactive Security


Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks - 2017 ABSTRACT: Mobile on-line social networks (OSNs) are rising as the popular mainstream platform for info and content sharing among
PROJECT TITLE :A Learning-Based Approach to Caching in Heterogenous Small Cell NetworksABSTRACT:A heterogenous network with base stations (BSs), tiny base stations (SBSs), and users distributed according to freelance Poisson
PROJECT TITLE :Critical communications and public safety networks, part 2: technical issues, security, and applications [Guest Editorial]ABSTRACT:As we tend to mentioned in the Guest Editorial of Part 1 of this Feature Topic,
PROJECT TITLE :Sparse kernel learning-based feature selection for anomaly detectionABSTRACT:In this paper, a completely unique framework of sparse kernel learning for support vector knowledge description (SVDD) primarily based
PROJECT TITLE :Learning-Based Uplink Interference Management in 4G LTE Cellular SystemsABSTRACT:LTE's uplink (UL) efficiency critically depends on how the interference across completely different cells is controlled. The unique

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry