2015
DOI: 10.1007/978-3-319-14039-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 60 publications
(40 citation statements)
references
References 16 publications
0
39
0
1
Order By: Relevance
“…As a result, solving the insurer's problem (16) is equivalent to solving the following problem after plugging (40) into (16): (41) is a nonlinear programming problem and it is challenging to find the analytical solution. We can leverage numerical methods to compute s * and obtain T * with (40). We can then find p * d,n and p * a,n by plugging s * into Proposition 1, and further obtain the solution of the FlipIn-C game defined in Definition 5.…”
Section: Cyber Insurance: Defender-cmentioning
confidence: 99%
“…As a result, solving the insurer's problem (16) is equivalent to solving the following problem after plugging (40) into (16): (41) is a nonlinear programming problem and it is challenging to find the analytical solution. We can leverage numerical methods to compute s * and obtain T * with (40). We can then find p * d,n and p * a,n by plugging s * into Proposition 1, and further obtain the solution of the FlipIn-C game defined in Definition 5.…”
Section: Cyber Insurance: Defender-cmentioning
confidence: 99%
“…In cybersecurity, deception has been adopted across many security techniques with much success, for example, in the strategic allocation of honeypots [8] and masking the properties of systems [9]. Using deceptive signals in Stackelberg Security Games also has great potential for use in cybersecurity.…”
Section: Deceptive Signaling For Cybersecuritymentioning
confidence: 99%
“…The use of game theory in cybersecurity is not new [5,13]. For instance, [17,18] study different game models that address strategies for deploying honeypot networks. They define basic honeypot selection games where the defender chooses the properties of the network, plus an extension where the attacker can also probe the network, and a final version where the attacker strategies are represented by an attack graph.…”
Section: Related Workmentioning
confidence: 99%