2018
DOI: 10.1007/978-3-030-01554-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Placement of Honeypots for Network Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Finally, honeypots could be applicable in smart buildings to emulate smart appliances and energy meters or in Advanced Metering Infrastructures (AMIs), operated by DSOs, to emulate smart meters [ 24 ]. It is assumed that the defender has a fixed set of resources and, as a result, is only able to defend a limited number of hosts [ 21 ].…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, honeypots could be applicable in smart buildings to emulate smart appliances and energy meters or in Advanced Metering Infrastructures (AMIs), operated by DSOs, to emulate smart meters [ 24 ]. It is assumed that the defender has a fixed set of resources and, as a result, is only able to defend a limited number of hosts [ 21 ].…”
Section: System Modelmentioning
confidence: 99%
“…Finally, Bilinski et al in [ 21 ] investigated the Nash Equilibrium (NE) of a honeynet system, in which the defender aims to protect a number of network hosts and has a fixed set of resources, therefore can defend only a limited number of hosts. On the contrary, the attacker can attack a specific number of hosts concurrently, although no cost is incurred to the adversary for each attack.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For repeated games, the value of suboptimal play is illustrated in (Bilinski, Gabrys, and Mauger 2018) by mathematically showing the disadvantage that defenders suffer when using a rational greedy strategy. We argue that by using cyber deception, the defender can create an illusion of playing suboptimally, which presents an opportunity to shift the advantage away from an attacker.…”
Section: The Value Of Suboptimal Playmentioning
confidence: 99%
“…Prior research shows that choosing the optimal number of honeypots in the network can help deceive the attacker into the trap (Píbil et al, 2012). Similarly, Bilinski et al (2018) presented a honeynet game to assign honeypots in the network in the most efficient way to ensure high-valued resources. However, further research is needed to see how varied honeypot proportions impact adversarial decision-making in cyberspace.…”
Section: Introductionmentioning
confidence: 99%