Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Infrastructure from [38] to illustrate game-theoretic APT modeling.

More »

Fig 1 Expand

Fig 2.

Example Attack Graph [38].

More »

Fig 2 Expand

Table 1.

Security controls (selection).

More »

Table 1 Expand

Table 2.

Example assessment of a security precaution.

More »

Table 2 Expand

Fig 3.

Agreeing vs. disagreeing expert ratings.

More »

Fig 3 Expand

Fig 4.

Comparing Different Preference Rules.

More »

Fig 4 Expand

Table 3.

APT scenarios (adversary’s action set AS2, based on Fig 2).

More »

Table 3 Expand

Fig 5.

Example of ⪯-choosing among two empirical distributions (inconsistent expert opinions).

More »

Fig 5 Expand

Table 4.

Correspondence of Attack Trees/Graphs and Extensive Form Games.

More »

Table 4 Expand

Table 5.

Possible mapping of graph distance to risk categories.

More »

Table 5 Expand

Fig 6.

Loss Assessment of Counteraction vs. Threat.

More »

Fig 6 Expand

Fig 7.

Specification of an APT Game (Example Workflow Snapshot).

More »

Fig 7 Expand

Table 6.

Benefits of Distribution-Valued Game-Modeling over Classical Game-Modeling.

More »

Table 6 Expand

Fig 8.

Applying Fictitious Play.

More »

Fig 8 Expand

Fig 9.

Equilibrium loss distribution for the example APT mitigation game.

More »

Fig 9 Expand

Fig 10.

Optimal Tradeoffs (simple case).

More »

Fig 10 Expand

Table 7.

Selected Strategies for the Example.

More »

Table 7 Expand

Table 8.

Example Expert Assessments.

More »

Table 8 Expand

Fig 11.

R-plot of our example APT matrix game.

More »

Fig 11 Expand