The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players.
View Article and Find Full Text PDFPhishing is one of the most common threats that users face while browsing the web. In the current threat landscape, a targeted phishing attack (i.e.
View Article and Find Full Text PDF