@misc{JVDOR16, author = { Ari Juels and Marten Erik van Dijk and Alina M. Oprea and Ronald L. Rivest }, title = { Scheduling Of Defensive Security Actions In Information Processing Systems }, howpublished = { U.S. Patent 9,471,777. Issued October 18, 2016. }, date = { 2016-10-18 }, OPTmonth = { October 18, }, OPTyear = { 2016 }, abstract = { A processing device is configured to identify a plurality of defensive security actions to be taken to address a persistent security threat to a system comprising information technology infrastructure, and to determine a schedule for performance of the defensive security actions based at least in part on a selected distribution derived from a game-theoretic model, such as a delayed exponential distribution or other type of modified exponential distribution. The system subject to the persistent security threat is configured to perform the defensive security actions in accordance with the schedule in order to deter the persistent security threat. The distribution may be selected so as to optimize defender benefit in the context of the game-theoretic model, where the game-theoretic model may comprise a stealthy takeover game in which attacker and defender entities can take actions at any time but cannot determine current game state without taking an action. } }