Optimal placement of honeypots for network defense

14Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We seek to combine recent advances in game theory of both cyber defense and deception to model the interactions between an attacker and defender on a network. We define a new class of games called -honeynet games which extend those defined in previous research. These games have incomplete and imperfect information since the attacker is unaware of moves made by the defender to secure a system, and the defender is not certain of the true identity of the attacker.

Cite

CITATION STYLE

APA

Bilinski, M., Gabrys, R., & Mauger, J. (2018). Optimal placement of honeypots for network defense. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11199 LNCS, pp. 115–126). Springer Verlag. https://doi.org/10.1007/978-3-030-01554-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free