We seek to combine recent advances in game theory of both cyber defense and deception to model the interactions between an attacker and defender on a network. We define a new class of games called -honeynet games which extend those defined in previous research. These games have incomplete and imperfect information since the attacker is unaware of moves made by the defender to secure a system, and the defender is not certain of the true identity of the attacker.
CITATION STYLE
Bilinski, M., Gabrys, R., & Mauger, J. (2018). Optimal placement of honeypots for network defense. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11199 LNCS, pp. 115–126). Springer Verlag. https://doi.org/10.1007/978-3-030-01554-1_7
Mendeley helps you to discover research relevant for your work.