Search Results for author: Linan Huang

Found 8 papers, 0 papers with code

ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies

no code implementations5 Apr 2022 Linan Huang, Quanyan Zhu

Incentive design is a proactive and non-invasive approach to achieving compliance by aligning an insider's incentive with the defender's security objective, which motivates (rather than commands) an insider to act in the organization's interests.

Management

RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks

no code implementations1 Nov 2021 Linan Huang, Quanyan Zhu

In this work, we identify and formally define a new type of proactive attentional attacks called Informational Denial-of-Service (IDoS) attacks that generate a large volume of feint attacks to overload human operators and hide real attacks among feints.

Decision Making Management

Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

no code implementations4 Aug 2021 Linan Huang, Quanyan Zhu

The numerical results illustrate how AM strategies can alleviate the severity level and the risk of IDoS attacks.

Management

Reinforcement Learning for Feedback-Enabled Cyber Resilience

no code implementations2 Jul 2021 Yunhan Huang, Linan Huang, Quanyan Zhu

In this work, we review the literature on RL for cyber resilience and discuss cyber resilience against three major types of vulnerabilities, i. e., posture-related, information-related, and human-related vulnerabilities.

Intrusion Detection reinforcement-learning +1

ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention

no code implementations13 Jun 2021 Linan Huang, Shumeng Jia, Emily Balcetis, Quanyan Zhu

The results show that the visual aids can statistically increase the attention level and improve the accuracy of phishing recognition from 74. 6% to a minimum of 86%.

Data Compression

Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense

no code implementations1 Jul 2019 Linan Huang, Quanyan Zhu

The increasing instances of advanced attacks call for a new defense paradigm that is active, autonomous, and adaptive, named as the \texttt{`3A'} defense paradigm.

Cryptography and Security

Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes

no code implementations27 Jun 2019 Linan Huang, Quanyan Zhu

In this work, we apply infinite-horizon Semi-Markov Decision Process (SMDP) to characterize a stochastic transition and sojourn time of attackers in the honeynet and quantify the reward-risk trade-off.

reinforcement-learning Reinforcement Learning (RL)

Cannot find the paper you are looking for? You can Submit a new open access paper.