2018
DOI: 10.3233/jcs-171094
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid adversarial defense: Merging honeypots and traditional security methods1

Abstract: Most past work on honeypots has made two assumptions: (i) they assume that the only defensive measure used is a honeypot mechanism, and (ii) they do not consider both rational and subrational adversaries and do not reason with an adversary model when placing honeypots. However, real-world system security officers use a mix of instruments such as traditional defenses (e.g. firewalls, intrusion detection systems), and honeypots form only one portion of the strategy. Moreover, the placement of traditional defense… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…This turn-based interaction can be understood as if the defense is reactive against attacker's exploits. The turn-based interaction has been adapted in cyber-security research [6]. The generalization to concurrent stochastic game arena is a part of our future work.…”
Section: A the Game Arena Of Cyber-deception Gamementioning
confidence: 99%
“…This turn-based interaction can be understood as if the defense is reactive against attacker's exploits. The turn-based interaction has been adapted in cyber-security research [6]. The generalization to concurrent stochastic game arena is a part of our future work.…”
Section: A the Game Arena Of Cyber-deception Gamementioning
confidence: 99%
“…A game-theoretic model for defending against attacks is studied in honeypot-enabled IoT [38]. A Stackelberg-style game, which consists of a leader and its follower, is employed in an enterprise network [39]. In this model, the defender serves as a leader to identify the optimal placement of firewalls, IDS, and honeypots simultaneously.…”
Section: Game-theoretic Approaches To Model Honeypotsmentioning
confidence: 99%